throbber
a») United States
`a2) Patent Application Publication 0) Pub. No.: US 2010/0273452 Al
`(43) Pub. Date: Oct. 28, 2010
`
`Rajannetal.
`
`US 20100273452A1
`
`(54) APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`(75)
`
`Inventors:
`
`Rajeev Durai Rajann, San Diego,
`CA (US); ThomasFrancis Doyle,
`San Diego, CA (US)
`
`Correspondence Address:
`QUALCOMM INCORPORATED
`5775 MOREHOUSEDR.
`
`SAN DIEGO, CA 92121 (US)
`
`(73) Assignee:
`
`QUALCOMMIncorporated, San
`Diego, CA (US)
`
`(21) Appl. No.:
`
`12/726,562
`
`(22)
`
`Filed:
`
`Mar. 18, 2010
`
`Related U.S. Application Data
`
`(60) Provisional application No. 61/172,765, filed on Apr.
`26, 2009.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2009.01)
`HOAW 24/00
`(2009.01)
`HO4W 12/00
`(52) U.S. C1. cece ceecneneeneeneeneeeeeee 455/411; 455/456.2
`
`(57)
`
`ABSTRACT
`
`A methodand apparatusforfacilitating location of a targeted
`wireless communications device (WCD)is provided. The
`method may comprise, enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`ality, and executing the at least one location functionality
`associated with the one or morelocation state routines iden-
`tified by the received location state code.
`
`iQ
`
`
`
`HIMPP 1009
`HIMPP 1009
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 1 of 9
`
`US 2010/0273452 Al
`
`ig
`
`v F
`
`IG. 1
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 2 of 9
`
`US 2010/0273452 Al
`
`
`
`
`
`Display
`Announcement
`
`
`Auto-Dailing
`Modification
`
`
`Module 201
`
`Module 203
`
`nvironment
`
`
`Operation
`
`Detection
`Modification
`
`
`
`
`
`Position
`Content
`
`Uncertainty
`
`Zone Module
`Modification
`Modification
`
`
`
`
`
`
`Electronic
`
`Persistence
`
`
`Leash Module
`
`
`
`Module 219
`
`
`
`Device ID
`
`
`Secondary
`User Control
`
`
`Module 225
`
`
`Module 221
`
`

`

`3;:
`
`Oct. 28, 2010 Sheet 3 of 9
`
`33333333333333333333333:3333333333
`<:33333333:33333333333333:3333333333
`
`<:
`
`Patent Application Publication
`
`US 2010/0273452 Al
`
`

`

`Patent Application Publication
`
`ty
`
`US 2010/0273452 Al
`
`pO
`
`Oct. 28, 2010 Sheet 4 of 9
`
`ESLLVOREDINE
`
`
`
`CELLQh0$Sach,
`
`CONEEVOT
`
`
`
`USESBoda
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`INTE MECHA
`
`US 2010/0273452 Al
`
`Oct. 28, 2010 Sheet 5 of 9
`
`
`
`
`
`AUTHO CAPTURE
`ROUTINE
`
`OTHER LOCATERS
`BCSITINE
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 6 of 9
`
`US 2010/0273452 Al
`
`RECOVERY MODULE
`
`poor nn ne eee ee te
`
`FIG.6
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 7 of 9
`
`US 2010/0273452 Al
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 8 of 9
`
`US 2010/0273452 Al
`
`RECEIVE A LOCATION STATE CODE
`
`EXECUTE A LOCATION FUNCTIONALITY
`
`ENABLE A LOCATION MODULE
`
`802
`
`804
`
`806
`
`FIG.8
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 9 of 9
`
`US 2010/0273452 Al
`
`902
`
`MEANS FOR ENABLING A LOCATION MODULEIN RESPONSE
`TO RECEIVING A LOCATION STATE CODE, WHEREIN THE
`LOCATION MODULE INCLUDES ONE OR MORE LOCATION
`STATE ROUTINES, WHEREIN AT LEAST ONE OF THE ONE OR
`MORE LOCATION STATE ROUTINESIS IDENTIFIED IN THE
`LOCATION STATE CODE, AND WHEREIN EACH LOCATION
`STATE ROUTINE INCLUDES AT LEAST ONE LOCATION
`FUNCTIONALITY
`
`LOCATION STATE CODE MEMORY
`
`MEANS FOR EXECUTING THE AT LEAST ONE LOCATION
`
`FUNCTIONALITY ASSOCIATED WITH THE ONE OR MORE
`
`LOCATION STATE ROUTINES IDENTIFIED BY THE RECEIVED
`
`FIG. 9
`
`

`

`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`CLAIM OF PRIORITY UNDER35 U.S.C. §119
`
`[0001] The present Application for Patent claimspriority to
`Provisional Application No. 61/172,765 filed Apr. 26, 2009,
`and assigned to the assignee hereof and hereby expressly
`incorporated by reference herein.
`
`BACKGROUND
`
`1. Field
`[0002]
`[0003] The disclosed aspects relate to wireless communi-
`cation devices, and moreparticularly, to systems, methods
`and apparatus for locating and/or tracking and/or recovering
`a wireless communication device, especially devices that
`have beenlost, stolen or misplaced.
`[0004]
`2. Background
`[0005] Wireless communication devices have become a
`prevalent means by which majorities of people worldwide
`have come to communicate. Wireless communication devices
`have become smaller and more powerful in order to meet
`consumer needs and to improve portability and convenience.
`The smallness and portability of such devices make them
`highly susceptible to being misplaced, lost or stolen. As the
`user penetration within the general population increases to
`include youngeraged and senior aged users, the likelihood for
`misplacing, losing or having a device stolen tends to increase.
`[0006] While many wireless communication devices are
`configured to provide passwordsecurity protection, the pass-
`word is typically required at device power-up. Thus, if a
`device has been lost or stolen while the poweris on,thefinder
`or the thiefcan useit as long as the device remains on. In many
`otherinstances, users prefer to forego passwordsecurity pro-
`tection because logging on each timethe device 1s powered up
`is viewed as tedious and unnecessary action.
`[0007] When the user of the wireless communication
`device is confronted with a situation in which the device is
`misplaced,lostor stolen, it provides for a troublesome andat
`times, traumatic experience. The wireless communication
`device, such as a mobile telephone, is no longer limited to
`providing a meansfor placing and receiving communication
`calls. The increased storage capacity and functionality of the
`devices may provide the user e-wallet or mobile-office func-
`tionality, which allows the user to not only store contact
`information but also credit card information, valuable and
`secured personal and business related information and the
`like. Thus, permanently losing a device and having to replace
`a lost or stolen device is not merely a matter ofjust facing the
`economical burden of purchasing a new device, it may also
`involve attempting to reacquire lost data, changing previous
`secure personal and/or business information canceling credit
`cards andthelike.
`
`[0008] Users confronted with a misplaced, stolen or lost
`wireless communication device typically perform one or
`more standard operations, such as searching for the device,
`reporting to the authorities that the device has been stolen,
`contacting the service providerto get services tumedoff and,
`if the device is permanently lost or stolen, purchasing a new
`device. All of these standard optionsare less than attractive to
`the user, as they require time, effort, cost and inducestress. In
`the case of a misplaced device, which is reported as lost for
`
`the purpose of disconnecting services and is then subse-
`quently found, the user has to perform the tedious and time-
`consuming process of re-contacting the service provider to
`havethe service reinstated.
`
`[0009] Regardless of whether the wireless communication
`device is misplaced, lost or stolenit is critical that the device
`be rendered unusable, either temporarily until the device is
`foundor returned, or permanently if the device is stolen, not
`foundor not returned.
`
`Inother situations in which a userloanstheir device
`[0010]
`to someoneelse, such as a parent loaning their device to their
`child, a need mayexist to track the location of the device
`and/or the corresponding loanee. In another application, it
`may be advantageousto provide a user a wireless communi-
`cation device and nefariously track the location ofthe user or
`the user’s actions. For example, a law enforcement agency
`maydesireto track the whereaboutsor actions of a suspected
`criminal, without the suspected criminal knowing that they
`are being tracked or their actions being monitored.
`[0011] Thus a need exists to provide for locating, tracking,
`and/or recovering wireless communication devices that have
`been misplacedlost, or stolen. As such a need exists to pro-
`vide disablement and secure the data stored on a wireless
`
`communication device that is misplaced,lost or stolen. Addi-
`tionally, a need also exists, for providing location and action
`tracking of wireless devices in the instance in which the
`device has been loaned or to provide covert surveillance by
`law enforcement of suspected criminals.
`
`SUMMARY
`
`In accordance with one or more aspects and corre-
`[0012]
`sponding disclosure thereof, various aspects are described in
`connection with facilitating location of a targeted wireless
`communications device (WCD). According to one aspect, a
`method for facilitating location of a targeted wireless com-
`munications device (WCD) is provided. The method can
`comprise enabling a location modulein responseto receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or morelocationstate routinesis identified in the location
`state code, and wherein each locationstate routine includesat
`least one location functionality. Moreover, the method can
`comprise executing the at least one location functionality
`associated with the one or morelocation state routines iden-
`tified by the received location state code.
`[0013] Yet another aspectrelates to at least one processor
`configured to facilitate location of a targeted wireless com-
`munications device (WCD). Theat least one processor can
`include a first module for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`ality. Further, the at least one processor can include a second
`module for executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0014]
`Still another aspect relates to a computer program
`product comprising a computer-readable medium. The com-
`puter-readable medium can include a first set of codes for
`causing a computer to enable a location modulein response to
`receiving a location state code, wherein the location module
`includes one or morelocation state routines, wherein at least
`
`

`

`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`one of the one or more location state routines is identified in
`the location state code, and wherein each location state rou-
`tine includes at least one location functionality. Further, the
`computer-readable medium can include a secondset of codes
`for causing the computer to execute theat least one location
`functionality associated with the one or more location state
`routines identified by the received location state code.
`[0015] Yet anotheraspect relates to an apparatus. The appa-
`ratus can include means for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`
`the apparatus can comprise means for
`ality. Moreover,
`executing the at least one location functionality associated
`with the one or more location state routines identified by the
`received location state code.
`
`[0016] Another aspect relates to an apparatus. The appara-
`tus can include a location recovery module operable to:
`enable the location recovery module in responseto receiving
`a location state code, wherein the location module includes
`oneor morelocation state routines, wherein at least one ofthe
`one or morelocationstate routinesis identified in the location
`state code, and wherein each locationstate routine includesat
`least one location functionality, and execute the at least one
`location functionality associated with the one or more loca-
`tion state routines identified by the received location state
`code.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0017] The disclosed aspects will hereinafter be described
`in conjunction with the appended drawings, providedto illus-
`trate and not to limit the disclosed aspects, wherein like
`designations denote like elements, and in which:
`[0018]
`FIG. 11s a block diagram of a system for remotely
`accessing a wireless communication device that has been
`misplaced, lost or stolen, according to an aspect;
`[0019] FIG.2 isa block diagramofthe various location and
`recovery routines executed by a wireless communication
`device that has been misplaced, lost or stolen, according to an
`aspect;
`FIG. 3 is a block diagram of a system for locating,
`[0020]
`tracking and/or recovering a targeted wireless communica-
`tion device, according to another aspect;
`[0021]
`FIG. 4 is an example of a communication data
`packet payload, according to an aspect;
`[0022]
`FIG. 5 isa block diagram ofa target wireless com-
`munication device, according to another aspect;
`[0023]
`FIG. 6 isa block diagram of a computing device that
`attempts to locate, track and/or recovera target wireless com-
`munication device, according to an aspect;
`[0024]
`FIG. 7 is a block diagram of an exemplary cellular
`telephone network used in communicating with the targeted
`wireless communication device, according to an aspect;
`[0025]
`FIG. 8 depicts an exemplary flow diagram ofa meth-
`odology for facilitating location of a targeted wireless com-
`munication device according to an aspect; and
`[0026]
`FIG. 9 is a block diagram of an exemplary commu-
`nication system that can facilitate location of a targeted wire-
`less communication device according to an aspect.
`DETAILED DESCRIPTION
`
`
`
`[0027] Various aspects are now described with reference to
`the drawings. In the following description, for purposes of
`
`explanation, numerousspecific details are set forth in order to
`provide a thorough understanding of one or more aspects. It
`maybe evident, however,that such aspect(s) may be practiced
`without these specific details.
`[0028] The various aspects are described herein are in con-
`nection with a wireless communication device. A wireless
`communication device can also be called a subscriber station,
`a subscriber unit, mobile station, mobile, remote station,
`access point, remote terminal, access terminal, user terminal,
`user agent, a user device, or user equipment. A subscriber
`station may bea cellular telephone, a cordless telephone, a
`Session Initiation Protocol (SIP) phone,a wireless local loop
`(WLL)station, a personaldigital assistant (PDA), a handheld
`device having wireless connection capability, or other pro-
`cessing device connected to a wireless modem.
`[0029] Present aspects provide for systems, devices, appa-
`ratus, methods and computer program products for locating,
`tracking and attempting to recover, wireless communication
`devices that have been misplaced,lost or stolen. In this regard,
`present aspects rely on generating a communication data
`packet, for example, a Short Message Service (SMS) com-
`munication data packet at a secondary wireless device, a web
`interface or a network service provider device. The commu-
`nication data packet includesa locating state code that iden-
`tifies one of a plurality of locating states that are operable on
`the targeted(i.e., the misplaced, lost or stolen) wireless com-
`munication device. The locating states are associated with
`one or more predetermined routines that are operable on the
`targeted wireless device. In some aspects, the locating state
`may beassociated with a sequence of routinesthat are trig-
`gered on the device.
`[0030] The predetermined routines may effectively dis-
`able/lock the wireless communication device, disable any
`application running on the wireless device, such as acommu-
`nication call application. In addition to disabling or locking
`the device, the predetermined routines maytrigger jamming
`or scrambling of communication signals, such as voice or
`data signals. Additionally, the predetermined routines may
`trigger audible, visual or sensory perceptible alerts to the
`possessorofthe devicethat identify the device as being lost or
`stolen. The predetermined routines may additionally capture
`data, such as geographic location data, image data, audio data
`and the like and communicatethe data to the owner/userofthe
`
`targeted device, to a network entity device, or to a service
`provider device. In turn the captured andretrieved informa-
`tion may be used to locate the device and/or the party whois
`in possession of the targeted device. Also, once data is cap-
`tured andretrieved from the wireless device, predetermined
`routines may provide for data to removed/deleted from the
`device. Additionally, the predeterminedroutines that capture
`and communicate data may be operated in a “stealth” mode so
`that conventional indicators that would normally be pre-
`sented, such as displayed lights or messages or audible tones,
`are suppressed to insure that the finder/thief is unaware that
`these routines are currently being executed. Also, the prede-
`termined routines may change an operational mode, such as
`changing the targeted device from a “‘silent” or “vibrate”ring
`state to an “audible”ring state.
`[0031] Referring to FIG. 1, a block diagram is depicted of a
`system 10 for remotely accessing a wireless communication
`device that has been misplaced, lost or stolen to initiate the
`locating,
`tracking and/or attempted recovery of present
`aspects. The user/owner 12 ofthe targeted wireless commu-
`nication device 14, which may be categorized as misplaced
`
`

`

`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`device, a lost device, a stolen device or a device that requires
`tracking or surveillance, may remotely access the device 14
`through various communication channels. The communica-
`tion channels provide for generating and communicating a
`communication data packet, such as an SMS messageor the
`like, which includes a locating state code for identifying one
`of a plurality of locating states (for example, a misplaced
`state, a lost state, a stolen state, a tracking state, a surveillance
`state, such as an emergency surveillance state or a covert
`surveillance state, and the like) that are operable on the tar-
`geted wireless communication device. As will be described at
`length infra., the locating states are associated with one or
`more predeterminedlocation routinesthat are operable on the
`targeted wireless device. In many aspects, a locating state is
`associated with a predetermined sequence of routines or
`actions that are executed to locate, track, and attempt to
`recover the target device 14. In one aspect, a locating state
`may include a location state code which may enable atleast
`one location functionality. As used herein, a location func-
`tionality may include, but is not limited to, any action per-
`formedto either directly or indirectly assist in location and/or
`recovery of the target device 14.
`[0032] As shownin FIG.1, the user/owner 12 may borrow
`or otherwise obtain an alternate or secondary wireless com-
`munication device 16 to generate and communicate the req-
`uisite communication data packet to the targeted device. In
`addition, the user/owner 12 may interface with a web inter-
`face through a PC 18, laptop (not shown in FIG. 1) or any
`other device having network access to the Internet. In such
`aspects, user/ownerwill provide necessary inputs to the web
`interface to initiate the generation and communication of the
`requisite communication data packetto the targeted device.In
`another aspect, user/owner 12 may communicate with a net-
`work/service provider entity 20 and the network/service pro-
`vider entity may provide the necessary inputs to a network
`server to initiate the generation and communication of the
`requisite communication data packet to the targeted device.
`Alternatively, any other communication mechanism capable
`of generating and communicating the necessary communica-
`tion data packet to the target device may also be used to
`initiate the location, tracking and attempted recovery process
`according to the present aspects.
`[0033]
`FIG. 2 provides a block diagram of various location
`routines that may be executed onthe targeted wireless com-
`munication device 14 in response to detection of location
`state code in a received communication data packet. As pre-
`viously noted, each location state will be associated with one
`or more location routines and, in some aspects, a location
`state will be associated with a sequence of location routines,
`such that detection of a location state code in a received
`communication data packet will trigger the execution of the
`sequence of location routines. As shown, in FIG.2, the tar-
`geted wireless communication device may be operable to
`execute a geographic location determining routine 22, such as
`a Global Positioning System (GPS)location determining rou-
`tine, a still or moving image capture routine 24 and/or an
`audio capture routine 26. The results of these routines, geo-
`graphic location data, image data and/or audio data may then
`be communicatedto back to the user/ownervia the secondary
`device 16 and/or a web interface, a network entity, such as a
`service provider, a law enforcemententity and/or any other
`relevant entity for analysis. Geographic location data pro-
`vides the ability to track the location of the misplaced,lost or
`stolen device. Imagedata,still or moving, and audio data may
`
`provide the ability to identify the finder/thief of the targeted
`device or identify the surrounding area in which the targeted
`device is located.
`
`[0034] Additionally, target device 14 may be operable to
`execute emergency/covert surveillance routine 27 that pro-
`vides surveillance of a location if an emergency event requir-
`ing surveillance occurs. For example, if a major accident
`occurs, such as an automobile accident, or a kidnapping/
`abduction occurs. The emergency/covert surveillance routine
`27 may be operable to activate the still or moving image
`capture routine 24 to capture still or moving image data, the
`geographic location-determining routine 22 for determining
`location, the audio capture routine 26 for capturing audio and
`the like. Additionally, as shownin ['IG.2, the targeted device
`14 may be operable to execute input mechanism,application
`and/or device disablement routine 28 that may operable to
`disable any input mechanism, such as the keypad, any appli-
`cation executable on the device, such as communication call
`applicationsor disable the devicein its entirety. The targeted
`device 14 mayalso be operable to execute various forms of
`sensoryalarm routines 30. Sensory alarm routines maytrig-
`ger audible alarms, such asa series of periodic or continuous
`audible tones or a pre-recorded message,visual alarms, such
`as messages displayed on the target device display or vibra-
`tional alarms, which cause the device to vibrate periodically
`or continually. Sensory alarm routines serve to acknowledge
`to the general public that the device is misplaced, lost or
`stolen. The emergency/covert surveillance routine 27 may be
`operated when the emergency surveillancestate is invoked or
`the emergency/covert surveillance routine 27 may be oper-
`ated in a “stealth” mode whenthe covert surveillancestate is
`invoked.
`
`[0035] Additionally, the target device 14 may be operable
`to execute powerreserve routine 32 that is operable maintain-
`ing a powerreservefor the location, tracking and/or recovery
`process. For example, power maybe reserved for determining
`location/GPSfixes, capturing image data and communicating
`with the remote communication device, such as a secondary
`wireless device, PC or network entity.
`[0036]
`In addition, the target device 14 may be operable to
`execute any other locating, tracking, recovery and/orsurveil-
`lance routine 32 that maybe operable to assist in accomplish-
`ing recovery of the target device 14. For example, the other
`locating routine 32 mayinclude a routine for changing an
`operational mode, such as changing the targeted device from
`a “silent”, “vibrate”, “airplane mode”, “low-volume”, or
`other new modesto an “audible”or “high volume”ringstate,
`e.g. such as by changing a speakeror ring tone volumelevel
`(‘maximum volume”),
`turing on an external
`speaker
`(“speaker phone mode”), etc. Often, the user of the targeted
`device will misplace the device while the device is in the
`“silent”, “vibration”or “low volume”ring state. Thesestates
`prohibit the device from being located by merely calling the
`device and listening for the ring tone. In addition, in certain
`instances it may be necessary to change the misplacedtar-
`geted device from an “off” state to an “on” state prior to
`changing the ring tone state or performing other locating
`routines on the targeted wireless device. Other locating,
`tracking, recovery and surveillance routines 32 may include
`routines operable for jamming, scrambling or otherwise cor-
`rupting the communication data, such as voice data, text data,
`imagedata or thelike.
`[0037]
`Inone aspect, other locating-related routine 32 may
`include a announcement module 201 for making audio
`
`

`

`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`announcements (e.g. a pre-recorded message, a ring-tone,
`etc.) even ifthe wireless device is functioning in a ‘vibrate’ or
`‘silent’? or ‘off mode of operation.
`In one aspect,
`the
`announcement module 201 may automatically increase vol-
`ume and/or turn on the speaker-phone to make audio
`announcements. In another aspect, the wireless device may be
`made apparent to people nearby. Furthermore, in such an
`aspect, any audio announcement may announcereturn recov-
`ery messagessuchasbutnotlimited to, a “call home”request,
`a request to contact a third party, or any announcementof
`return instructions, mailing instructions (e.g. mailing address
`and account numberto use to charge mailing fees)or a tele-
`phone numberto call, etc. Still further, in such an aspect, any
`audio announcement may announce a warningthat the wire-
`less device is being tracked, or authorities have been notified,
`etc. Even further, in one aspect, the announcement module
`201 may promptthe wireless device to phone announce and/
`or display a message, such as a pre-recorded audioclip and/or
`graphic, describing one or more ofthe actions the phoneis
`about to perform, such as taking photos, recording audio,
`video, etc., prior to taking such actions. In another aspect,
`audio announcements mayfurther announcethat the wireless
`device is being disabled, or can not makecalls, etc. In one
`aspect, once an announcement is performed, the wireless
`device may be obtained by a searching entity such as but
`limited to, the owner/user, a third party, etc. In such an aspect,
`the wireless device may be obtained by being returned or
`retrieved by a searching entity. In the aspect in which a third
`party obtains the wireless device, the third party may then
`return the wireless device to the owner. The returning may be
`performeddirectly, through postage, etc. Further an owner
`may be located through any numberofidentifying character-
`istics, such as, a phone number, an address, an account num-
`ber, etc.
`In one aspect, other locating-related routine 32 may
`[0038]
`include an auto-dialing module 203 for enabling one or more
`auto dialing presets. In such an aspect, the auto-dialing mod-
`ule 203 mayinclude one or more autodial presets which may
`include but are not limited to, a “call home” preset that
`enables the device to call a predefined “home”location, such
`as another numberregistered to the wireless device user, a call
`center able to handle returns of the device, etc. In such an
`aspect, the one or more auto-dialing presets may be presented
`more prominently on the wireless device display than when
`such presets are presented, if at all, when the routine is not
`enabled.
`
`In one aspect, other locating-related routine 32 may
`[0039]
`include a display modification module 205 for continuously,
`intermittently and/or periodically modifying the wireless
`device display state. For example, a wireless device may
`modify its display by blanking out the display, changing a
`radio frequency (RF) signal strength indicator to falsely dis-
`play a reduced value, changing a battery indicator to falsely
`display a reduced value, etc. In another example, a wireless
`device may changethe display screen color, intensity and/or
`cause the screen to flash so as to more readily facilitate locat-
`ing the wireless device or to give the impression that the
`display screen is not working properly in order to discourage
`unauthorizeduse, e.g. triggered by an attempted usageof the
`device when this routine is active. As such, in the display
`modification module 205, the device may provide a false
`sense of low or faulty performance, thereby discouraging any
`attempted unauthorized usage of the device.
`
`In another aspect, other locating-related routine 32
`[0040]
`may include a operation modification module 207 for con-
`tinuously,
`intermittently and/or periodically modifying at
`least one wireless device operationalstate. For example, upon
`activation of the operation modification module 207, the
`wireless device may power down,loop between power down/
`up, etc. so as to frustrate any attempted unauthorized usage of
`the wireless device. In another example, upon activation of
`the operation modification module 207, the wireless device
`mayperiodically disable the RF transceiver. The operation
`modification module 207 may be triggered by attempted
`unauthorized usage of the device while this routine is acti-
`vated. In another aspect, the wireless device may shield,
`encrypt, delete or otherwise protect data stored on the wire-
`less device. In such an aspect, the wireless device maytrans-
`mit at least a portion of user generated content(e.g. contacts,
`passwords, audio, photos, videos, applications, etc.) and
`purge the wireless device thereafter.
`[0041]
`In another aspect, other locating-related routine 32
`may include a posilion modification module 209 for continu-
`ously, intermittently and/or periodically modifying the wire-
`less device physical positioning. For example, the position
`modification module 209 may include instructions config-
`ured to cause a camera associated with the wireless device to
`
`move, rotate, or be manipulated in some mannerso as to
`provide an image, video, etc. of the surroundings. In one
`aspect, the wireless device mayvibrate, flip, move in a spe-
`cific direction,etc., in response to a variety of conditions. For
`example, a camera associated with the wireless device may be
`facing downorin a direction that does not assist in location.
`In such an example, the wireless device may attempt to adjust
`its physical positioning so as to more readily facilitate locat-
`ing the wireless device. In another example, the device may
`include an actuator connectedto an arm, suchasa flip portion
`of the device, and activation of the position modification
`module 209 may energize actuator to automatically moveflip
`portion, for example, in an effort to change a position of the
`device, e.g. to change a side of the device including the
`camera from facing downto facing up or facing sideways. In
`another example, if an image taken is “black” (e.g. camerais
`covered or lying face down on ground), the target WCD may
`activate the position modification module 209. In such an
`example, a “black” image maybe defined as where a majority
`of pixels in a digital image are black oroff.
`[0042]
`In one aspect, other locating-related routine 32 may
`include an uncertainty zone module 213 for determining an
`“uncertainty zone.” As used with respect to this aspect, an
`uncertainty zone may be defined as a geographic region of
`defined dimensions within which the exact location of the
`
`wireless device may not be determined. For example, GPS
`aided tracking of the wireless device may provide specific
`latitude and longitude coordinates, however, there may be a
`degree of uncertainty with respect to such coordinates, e.g.
`based on the precision ofthe system or based on lack of some
`coordinates. For example, latitude and longitude coordinates
`maycorrespond to a high rise building, and the uncertainty
`zone may includeat least a portion of the high-rise building,
`e.g. such as a floor within the building when the GPS infor-
`mation does not include an altitude. In another example,
`specified latitude and longitude coordinates may be provided
`although a device being used to find those coordinates may
`not be able to exactly determine its own location. In such an
`instance, the uncertainty zone may be defined by the search-
`ing device locational accuracy. In one aspect, the wireless
`
`

`

`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`device may transmit location informationto aid in det

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket