`a2) Patent Application Publication 0) Pub. No.: US 2010/0273452 Al
`(43) Pub. Date: Oct. 28, 2010
`
`Rajannetal.
`
`US 20100273452A1
`
`(54) APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`(75)
`
`Inventors:
`
`Rajeev Durai Rajann, San Diego,
`CA (US); ThomasFrancis Doyle,
`San Diego, CA (US)
`
`Correspondence Address:
`QUALCOMM INCORPORATED
`5775 MOREHOUSEDR.
`
`SAN DIEGO, CA 92121 (US)
`
`(73) Assignee:
`
`QUALCOMMIncorporated, San
`Diego, CA (US)
`
`(21) Appl. No.:
`
`12/726,562
`
`(22)
`
`Filed:
`
`Mar. 18, 2010
`
`Related U.S. Application Data
`
`(60) Provisional application No. 61/172,765, filed on Apr.
`26, 2009.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2009.01)
`HOAW 24/00
`(2009.01)
`HO4W 12/00
`(52) U.S. C1. cece ceecneneeneeneeneeeeeee 455/411; 455/456.2
`
`(57)
`
`ABSTRACT
`
`A methodand apparatusforfacilitating location of a targeted
`wireless communications device (WCD)is provided. The
`method may comprise, enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`ality, and executing the at least one location functionality
`associated with the one or morelocation state routines iden-
`tified by the received location state code.
`
`iQ
`
`
`
`HIMPP 1009
`HIMPP 1009
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 1 of 9
`
`US 2010/0273452 Al
`
`ig
`
`v F
`
`IG. 1
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 2 of 9
`
`US 2010/0273452 Al
`
`
`
`
`
`Display
`Announcement
`
`
`Auto-Dailing
`Modification
`
`
`Module 201
`
`Module 203
`
`nvironment
`
`
`Operation
`
`Detection
`Modification
`
`
`
`
`
`Position
`Content
`
`Uncertainty
`
`Zone Module
`Modification
`Modification
`
`
`
`
`
`
`Electronic
`
`Persistence
`
`
`Leash Module
`
`
`
`Module 219
`
`
`
`Device ID
`
`
`Secondary
`User Control
`
`
`Module 225
`
`
`Module 221
`
`
`
`3;:
`
`Oct. 28, 2010 Sheet 3 of 9
`
`33333333333333333333333:3333333333
`<:33333333:33333333333333:3333333333
`
`<:
`
`Patent Application Publication
`
`US 2010/0273452 Al
`
`
`
`Patent Application Publication
`
`ty
`
`US 2010/0273452 Al
`
`pO
`
`Oct. 28, 2010 Sheet 4 of 9
`
`ESLLVOREDINE
`
`
`
`CELLQh0$Sach,
`
`CONEEVOT
`
`
`
`USESBoda
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`INTE MECHA
`
`US 2010/0273452 Al
`
`Oct. 28, 2010 Sheet 5 of 9
`
`
`
`
`
`AUTHO CAPTURE
`ROUTINE
`
`OTHER LOCATERS
`BCSITINE
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 6 of 9
`
`US 2010/0273452 Al
`
`RECOVERY MODULE
`
`poor nn ne eee ee te
`
`FIG.6
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 7 of 9
`
`US 2010/0273452 Al
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 8 of 9
`
`US 2010/0273452 Al
`
`RECEIVE A LOCATION STATE CODE
`
`EXECUTE A LOCATION FUNCTIONALITY
`
`ENABLE A LOCATION MODULE
`
`802
`
`804
`
`806
`
`FIG.8
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 9 of 9
`
`US 2010/0273452 Al
`
`902
`
`MEANS FOR ENABLING A LOCATION MODULEIN RESPONSE
`TO RECEIVING A LOCATION STATE CODE, WHEREIN THE
`LOCATION MODULE INCLUDES ONE OR MORE LOCATION
`STATE ROUTINES, WHEREIN AT LEAST ONE OF THE ONE OR
`MORE LOCATION STATE ROUTINESIS IDENTIFIED IN THE
`LOCATION STATE CODE, AND WHEREIN EACH LOCATION
`STATE ROUTINE INCLUDES AT LEAST ONE LOCATION
`FUNCTIONALITY
`
`LOCATION STATE CODE MEMORY
`
`MEANS FOR EXECUTING THE AT LEAST ONE LOCATION
`
`FUNCTIONALITY ASSOCIATED WITH THE ONE OR MORE
`
`LOCATION STATE ROUTINES IDENTIFIED BY THE RECEIVED
`
`FIG. 9
`
`
`
`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`CLAIM OF PRIORITY UNDER35 U.S.C. §119
`
`[0001] The present Application for Patent claimspriority to
`Provisional Application No. 61/172,765 filed Apr. 26, 2009,
`and assigned to the assignee hereof and hereby expressly
`incorporated by reference herein.
`
`BACKGROUND
`
`1. Field
`[0002]
`[0003] The disclosed aspects relate to wireless communi-
`cation devices, and moreparticularly, to systems, methods
`and apparatus for locating and/or tracking and/or recovering
`a wireless communication device, especially devices that
`have beenlost, stolen or misplaced.
`[0004]
`2. Background
`[0005] Wireless communication devices have become a
`prevalent means by which majorities of people worldwide
`have come to communicate. Wireless communication devices
`have become smaller and more powerful in order to meet
`consumer needs and to improve portability and convenience.
`The smallness and portability of such devices make them
`highly susceptible to being misplaced, lost or stolen. As the
`user penetration within the general population increases to
`include youngeraged and senior aged users, the likelihood for
`misplacing, losing or having a device stolen tends to increase.
`[0006] While many wireless communication devices are
`configured to provide passwordsecurity protection, the pass-
`word is typically required at device power-up. Thus, if a
`device has been lost or stolen while the poweris on,thefinder
`or the thiefcan useit as long as the device remains on. In many
`otherinstances, users prefer to forego passwordsecurity pro-
`tection because logging on each timethe device 1s powered up
`is viewed as tedious and unnecessary action.
`[0007] When the user of the wireless communication
`device is confronted with a situation in which the device is
`misplaced,lostor stolen, it provides for a troublesome andat
`times, traumatic experience. The wireless communication
`device, such as a mobile telephone, is no longer limited to
`providing a meansfor placing and receiving communication
`calls. The increased storage capacity and functionality of the
`devices may provide the user e-wallet or mobile-office func-
`tionality, which allows the user to not only store contact
`information but also credit card information, valuable and
`secured personal and business related information and the
`like. Thus, permanently losing a device and having to replace
`a lost or stolen device is not merely a matter ofjust facing the
`economical burden of purchasing a new device, it may also
`involve attempting to reacquire lost data, changing previous
`secure personal and/or business information canceling credit
`cards andthelike.
`
`[0008] Users confronted with a misplaced, stolen or lost
`wireless communication device typically perform one or
`more standard operations, such as searching for the device,
`reporting to the authorities that the device has been stolen,
`contacting the service providerto get services tumedoff and,
`if the device is permanently lost or stolen, purchasing a new
`device. All of these standard optionsare less than attractive to
`the user, as they require time, effort, cost and inducestress. In
`the case of a misplaced device, which is reported as lost for
`
`the purpose of disconnecting services and is then subse-
`quently found, the user has to perform the tedious and time-
`consuming process of re-contacting the service provider to
`havethe service reinstated.
`
`[0009] Regardless of whether the wireless communication
`device is misplaced, lost or stolenit is critical that the device
`be rendered unusable, either temporarily until the device is
`foundor returned, or permanently if the device is stolen, not
`foundor not returned.
`
`Inother situations in which a userloanstheir device
`[0010]
`to someoneelse, such as a parent loaning their device to their
`child, a need mayexist to track the location of the device
`and/or the corresponding loanee. In another application, it
`may be advantageousto provide a user a wireless communi-
`cation device and nefariously track the location ofthe user or
`the user’s actions. For example, a law enforcement agency
`maydesireto track the whereaboutsor actions of a suspected
`criminal, without the suspected criminal knowing that they
`are being tracked or their actions being monitored.
`[0011] Thus a need exists to provide for locating, tracking,
`and/or recovering wireless communication devices that have
`been misplacedlost, or stolen. As such a need exists to pro-
`vide disablement and secure the data stored on a wireless
`
`communication device that is misplaced,lost or stolen. Addi-
`tionally, a need also exists, for providing location and action
`tracking of wireless devices in the instance in which the
`device has been loaned or to provide covert surveillance by
`law enforcement of suspected criminals.
`
`SUMMARY
`
`In accordance with one or more aspects and corre-
`[0012]
`sponding disclosure thereof, various aspects are described in
`connection with facilitating location of a targeted wireless
`communications device (WCD). According to one aspect, a
`method for facilitating location of a targeted wireless com-
`munications device (WCD) is provided. The method can
`comprise enabling a location modulein responseto receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or morelocationstate routinesis identified in the location
`state code, and wherein each locationstate routine includesat
`least one location functionality. Moreover, the method can
`comprise executing the at least one location functionality
`associated with the one or morelocation state routines iden-
`tified by the received location state code.
`[0013] Yet another aspectrelates to at least one processor
`configured to facilitate location of a targeted wireless com-
`munications device (WCD). Theat least one processor can
`include a first module for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`ality. Further, the at least one processor can include a second
`module for executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0014]
`Still another aspect relates to a computer program
`product comprising a computer-readable medium. The com-
`puter-readable medium can include a first set of codes for
`causing a computer to enable a location modulein response to
`receiving a location state code, wherein the location module
`includes one or morelocation state routines, wherein at least
`
`
`
`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`one of the one or more location state routines is identified in
`the location state code, and wherein each location state rou-
`tine includes at least one location functionality. Further, the
`computer-readable medium can include a secondset of codes
`for causing the computer to execute theat least one location
`functionality associated with the one or more location state
`routines identified by the received location state code.
`[0015] Yet anotheraspect relates to an apparatus. The appa-
`ratus can include means for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein atleast one ofthe one or morelocation state routines
`is identified in the location state code, and wherein each
`location state routine includesat least one location function-
`
`the apparatus can comprise means for
`ality. Moreover,
`executing the at least one location functionality associated
`with the one or more location state routines identified by the
`received location state code.
`
`[0016] Another aspect relates to an apparatus. The appara-
`tus can include a location recovery module operable to:
`enable the location recovery module in responseto receiving
`a location state code, wherein the location module includes
`oneor morelocation state routines, wherein at least one ofthe
`one or morelocationstate routinesis identified in the location
`state code, and wherein each locationstate routine includesat
`least one location functionality, and execute the at least one
`location functionality associated with the one or more loca-
`tion state routines identified by the received location state
`code.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0017] The disclosed aspects will hereinafter be described
`in conjunction with the appended drawings, providedto illus-
`trate and not to limit the disclosed aspects, wherein like
`designations denote like elements, and in which:
`[0018]
`FIG. 11s a block diagram of a system for remotely
`accessing a wireless communication device that has been
`misplaced, lost or stolen, according to an aspect;
`[0019] FIG.2 isa block diagramofthe various location and
`recovery routines executed by a wireless communication
`device that has been misplaced, lost or stolen, according to an
`aspect;
`FIG. 3 is a block diagram of a system for locating,
`[0020]
`tracking and/or recovering a targeted wireless communica-
`tion device, according to another aspect;
`[0021]
`FIG. 4 is an example of a communication data
`packet payload, according to an aspect;
`[0022]
`FIG. 5 isa block diagram ofa target wireless com-
`munication device, according to another aspect;
`[0023]
`FIG. 6 isa block diagram of a computing device that
`attempts to locate, track and/or recovera target wireless com-
`munication device, according to an aspect;
`[0024]
`FIG. 7 is a block diagram of an exemplary cellular
`telephone network used in communicating with the targeted
`wireless communication device, according to an aspect;
`[0025]
`FIG. 8 depicts an exemplary flow diagram ofa meth-
`odology for facilitating location of a targeted wireless com-
`munication device according to an aspect; and
`[0026]
`FIG. 9 is a block diagram of an exemplary commu-
`nication system that can facilitate location of a targeted wire-
`less communication device according to an aspect.
`DETAILED DESCRIPTION
`
`
`
`[0027] Various aspects are now described with reference to
`the drawings. In the following description, for purposes of
`
`explanation, numerousspecific details are set forth in order to
`provide a thorough understanding of one or more aspects. It
`maybe evident, however,that such aspect(s) may be practiced
`without these specific details.
`[0028] The various aspects are described herein are in con-
`nection with a wireless communication device. A wireless
`communication device can also be called a subscriber station,
`a subscriber unit, mobile station, mobile, remote station,
`access point, remote terminal, access terminal, user terminal,
`user agent, a user device, or user equipment. A subscriber
`station may bea cellular telephone, a cordless telephone, a
`Session Initiation Protocol (SIP) phone,a wireless local loop
`(WLL)station, a personaldigital assistant (PDA), a handheld
`device having wireless connection capability, or other pro-
`cessing device connected to a wireless modem.
`[0029] Present aspects provide for systems, devices, appa-
`ratus, methods and computer program products for locating,
`tracking and attempting to recover, wireless communication
`devices that have been misplaced,lost or stolen. In this regard,
`present aspects rely on generating a communication data
`packet, for example, a Short Message Service (SMS) com-
`munication data packet at a secondary wireless device, a web
`interface or a network service provider device. The commu-
`nication data packet includesa locating state code that iden-
`tifies one of a plurality of locating states that are operable on
`the targeted(i.e., the misplaced, lost or stolen) wireless com-
`munication device. The locating states are associated with
`one or more predetermined routines that are operable on the
`targeted wireless device. In some aspects, the locating state
`may beassociated with a sequence of routinesthat are trig-
`gered on the device.
`[0030] The predetermined routines may effectively dis-
`able/lock the wireless communication device, disable any
`application running on the wireless device, such as acommu-
`nication call application. In addition to disabling or locking
`the device, the predetermined routines maytrigger jamming
`or scrambling of communication signals, such as voice or
`data signals. Additionally, the predetermined routines may
`trigger audible, visual or sensory perceptible alerts to the
`possessorofthe devicethat identify the device as being lost or
`stolen. The predetermined routines may additionally capture
`data, such as geographic location data, image data, audio data
`and the like and communicatethe data to the owner/userofthe
`
`targeted device, to a network entity device, or to a service
`provider device. In turn the captured andretrieved informa-
`tion may be used to locate the device and/or the party whois
`in possession of the targeted device. Also, once data is cap-
`tured andretrieved from the wireless device, predetermined
`routines may provide for data to removed/deleted from the
`device. Additionally, the predeterminedroutines that capture
`and communicate data may be operated in a “stealth” mode so
`that conventional indicators that would normally be pre-
`sented, such as displayed lights or messages or audible tones,
`are suppressed to insure that the finder/thief is unaware that
`these routines are currently being executed. Also, the prede-
`termined routines may change an operational mode, such as
`changing the targeted device from a “‘silent” or “vibrate”ring
`state to an “audible”ring state.
`[0031] Referring to FIG. 1, a block diagram is depicted of a
`system 10 for remotely accessing a wireless communication
`device that has been misplaced, lost or stolen to initiate the
`locating,
`tracking and/or attempted recovery of present
`aspects. The user/owner 12 ofthe targeted wireless commu-
`nication device 14, which may be categorized as misplaced
`
`
`
`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`device, a lost device, a stolen device or a device that requires
`tracking or surveillance, may remotely access the device 14
`through various communication channels. The communica-
`tion channels provide for generating and communicating a
`communication data packet, such as an SMS messageor the
`like, which includes a locating state code for identifying one
`of a plurality of locating states (for example, a misplaced
`state, a lost state, a stolen state, a tracking state, a surveillance
`state, such as an emergency surveillance state or a covert
`surveillance state, and the like) that are operable on the tar-
`geted wireless communication device. As will be described at
`length infra., the locating states are associated with one or
`more predeterminedlocation routinesthat are operable on the
`targeted wireless device. In many aspects, a locating state is
`associated with a predetermined sequence of routines or
`actions that are executed to locate, track, and attempt to
`recover the target device 14. In one aspect, a locating state
`may include a location state code which may enable atleast
`one location functionality. As used herein, a location func-
`tionality may include, but is not limited to, any action per-
`formedto either directly or indirectly assist in location and/or
`recovery of the target device 14.
`[0032] As shownin FIG.1, the user/owner 12 may borrow
`or otherwise obtain an alternate or secondary wireless com-
`munication device 16 to generate and communicate the req-
`uisite communication data packet to the targeted device. In
`addition, the user/owner 12 may interface with a web inter-
`face through a PC 18, laptop (not shown in FIG. 1) or any
`other device having network access to the Internet. In such
`aspects, user/ownerwill provide necessary inputs to the web
`interface to initiate the generation and communication of the
`requisite communication data packetto the targeted device.In
`another aspect, user/owner 12 may communicate with a net-
`work/service provider entity 20 and the network/service pro-
`vider entity may provide the necessary inputs to a network
`server to initiate the generation and communication of the
`requisite communication data packet to the targeted device.
`Alternatively, any other communication mechanism capable
`of generating and communicating the necessary communica-
`tion data packet to the target device may also be used to
`initiate the location, tracking and attempted recovery process
`according to the present aspects.
`[0033]
`FIG. 2 provides a block diagram of various location
`routines that may be executed onthe targeted wireless com-
`munication device 14 in response to detection of location
`state code in a received communication data packet. As pre-
`viously noted, each location state will be associated with one
`or more location routines and, in some aspects, a location
`state will be associated with a sequence of location routines,
`such that detection of a location state code in a received
`communication data packet will trigger the execution of the
`sequence of location routines. As shown, in FIG.2, the tar-
`geted wireless communication device may be operable to
`execute a geographic location determining routine 22, such as
`a Global Positioning System (GPS)location determining rou-
`tine, a still or moving image capture routine 24 and/or an
`audio capture routine 26. The results of these routines, geo-
`graphic location data, image data and/or audio data may then
`be communicatedto back to the user/ownervia the secondary
`device 16 and/or a web interface, a network entity, such as a
`service provider, a law enforcemententity and/or any other
`relevant entity for analysis. Geographic location data pro-
`vides the ability to track the location of the misplaced,lost or
`stolen device. Imagedata,still or moving, and audio data may
`
`provide the ability to identify the finder/thief of the targeted
`device or identify the surrounding area in which the targeted
`device is located.
`
`[0034] Additionally, target device 14 may be operable to
`execute emergency/covert surveillance routine 27 that pro-
`vides surveillance of a location if an emergency event requir-
`ing surveillance occurs. For example, if a major accident
`occurs, such as an automobile accident, or a kidnapping/
`abduction occurs. The emergency/covert surveillance routine
`27 may be operable to activate the still or moving image
`capture routine 24 to capture still or moving image data, the
`geographic location-determining routine 22 for determining
`location, the audio capture routine 26 for capturing audio and
`the like. Additionally, as shownin ['IG.2, the targeted device
`14 may be operable to execute input mechanism,application
`and/or device disablement routine 28 that may operable to
`disable any input mechanism, such as the keypad, any appli-
`cation executable on the device, such as communication call
`applicationsor disable the devicein its entirety. The targeted
`device 14 mayalso be operable to execute various forms of
`sensoryalarm routines 30. Sensory alarm routines maytrig-
`ger audible alarms, such asa series of periodic or continuous
`audible tones or a pre-recorded message,visual alarms, such
`as messages displayed on the target device display or vibra-
`tional alarms, which cause the device to vibrate periodically
`or continually. Sensory alarm routines serve to acknowledge
`to the general public that the device is misplaced, lost or
`stolen. The emergency/covert surveillance routine 27 may be
`operated when the emergency surveillancestate is invoked or
`the emergency/covert surveillance routine 27 may be oper-
`ated in a “stealth” mode whenthe covert surveillancestate is
`invoked.
`
`[0035] Additionally, the target device 14 may be operable
`to execute powerreserve routine 32 that is operable maintain-
`ing a powerreservefor the location, tracking and/or recovery
`process. For example, power maybe reserved for determining
`location/GPSfixes, capturing image data and communicating
`with the remote communication device, such as a secondary
`wireless device, PC or network entity.
`[0036]
`In addition, the target device 14 may be operable to
`execute any other locating, tracking, recovery and/orsurveil-
`lance routine 32 that maybe operable to assist in accomplish-
`ing recovery of the target device 14. For example, the other
`locating routine 32 mayinclude a routine for changing an
`operational mode, such as changing the targeted device from
`a “silent”, “vibrate”, “airplane mode”, “low-volume”, or
`other new modesto an “audible”or “high volume”ringstate,
`e.g. such as by changing a speakeror ring tone volumelevel
`(‘maximum volume”),
`turing on an external
`speaker
`(“speaker phone mode”), etc. Often, the user of the targeted
`device will misplace the device while the device is in the
`“silent”, “vibration”or “low volume”ring state. Thesestates
`prohibit the device from being located by merely calling the
`device and listening for the ring tone. In addition, in certain
`instances it may be necessary to change the misplacedtar-
`geted device from an “off” state to an “on” state prior to
`changing the ring tone state or performing other locating
`routines on the targeted wireless device. Other locating,
`tracking, recovery and surveillance routines 32 may include
`routines operable for jamming, scrambling or otherwise cor-
`rupting the communication data, such as voice data, text data,
`imagedata or thelike.
`[0037]
`Inone aspect, other locating-related routine 32 may
`include a announcement module 201 for making audio
`
`
`
`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`announcements (e.g. a pre-recorded message, a ring-tone,
`etc.) even ifthe wireless device is functioning in a ‘vibrate’ or
`‘silent’? or ‘off mode of operation.
`In one aspect,
`the
`announcement module 201 may automatically increase vol-
`ume and/or turn on the speaker-phone to make audio
`announcements. In another aspect, the wireless device may be
`made apparent to people nearby. Furthermore, in such an
`aspect, any audio announcement may announcereturn recov-
`ery messagessuchasbutnotlimited to, a “call home”request,
`a request to contact a third party, or any announcementof
`return instructions, mailing instructions (e.g. mailing address
`and account numberto use to charge mailing fees)or a tele-
`phone numberto call, etc. Still further, in such an aspect, any
`audio announcement may announce a warningthat the wire-
`less device is being tracked, or authorities have been notified,
`etc. Even further, in one aspect, the announcement module
`201 may promptthe wireless device to phone announce and/
`or display a message, such as a pre-recorded audioclip and/or
`graphic, describing one or more ofthe actions the phoneis
`about to perform, such as taking photos, recording audio,
`video, etc., prior to taking such actions. In another aspect,
`audio announcements mayfurther announcethat the wireless
`device is being disabled, or can not makecalls, etc. In one
`aspect, once an announcement is performed, the wireless
`device may be obtained by a searching entity such as but
`limited to, the owner/user, a third party, etc. In such an aspect,
`the wireless device may be obtained by being returned or
`retrieved by a searching entity. In the aspect in which a third
`party obtains the wireless device, the third party may then
`return the wireless device to the owner. The returning may be
`performeddirectly, through postage, etc. Further an owner
`may be located through any numberofidentifying character-
`istics, such as, a phone number, an address, an account num-
`ber, etc.
`In one aspect, other locating-related routine 32 may
`[0038]
`include an auto-dialing module 203 for enabling one or more
`auto dialing presets. In such an aspect, the auto-dialing mod-
`ule 203 mayinclude one or more autodial presets which may
`include but are not limited to, a “call home” preset that
`enables the device to call a predefined “home”location, such
`as another numberregistered to the wireless device user, a call
`center able to handle returns of the device, etc. In such an
`aspect, the one or more auto-dialing presets may be presented
`more prominently on the wireless device display than when
`such presets are presented, if at all, when the routine is not
`enabled.
`
`In one aspect, other locating-related routine 32 may
`[0039]
`include a display modification module 205 for continuously,
`intermittently and/or periodically modifying the wireless
`device display state. For example, a wireless device may
`modify its display by blanking out the display, changing a
`radio frequency (RF) signal strength indicator to falsely dis-
`play a reduced value, changing a battery indicator to falsely
`display a reduced value, etc. In another example, a wireless
`device may changethe display screen color, intensity and/or
`cause the screen to flash so as to more readily facilitate locat-
`ing the wireless device or to give the impression that the
`display screen is not working properly in order to discourage
`unauthorizeduse, e.g. triggered by an attempted usageof the
`device when this routine is active. As such, in the display
`modification module 205, the device may provide a false
`sense of low or faulty performance, thereby discouraging any
`attempted unauthorized usage of the device.
`
`In another aspect, other locating-related routine 32
`[0040]
`may include a operation modification module 207 for con-
`tinuously,
`intermittently and/or periodically modifying at
`least one wireless device operationalstate. For example, upon
`activation of the operation modification module 207, the
`wireless device may power down,loop between power down/
`up, etc. so as to frustrate any attempted unauthorized usage of
`the wireless device. In another example, upon activation of
`the operation modification module 207, the wireless device
`mayperiodically disable the RF transceiver. The operation
`modification module 207 may be triggered by attempted
`unauthorized usage of the device while this routine is acti-
`vated. In another aspect, the wireless device may shield,
`encrypt, delete or otherwise protect data stored on the wire-
`less device. In such an aspect, the wireless device maytrans-
`mit at least a portion of user generated content(e.g. contacts,
`passwords, audio, photos, videos, applications, etc.) and
`purge the wireless device thereafter.
`[0041]
`In another aspect, other locating-related routine 32
`may include a posilion modification module 209 for continu-
`ously, intermittently and/or periodically modifying the wire-
`less device physical positioning. For example, the position
`modification module 209 may include instructions config-
`ured to cause a camera associated with the wireless device to
`
`move, rotate, or be manipulated in some mannerso as to
`provide an image, video, etc. of the surroundings. In one
`aspect, the wireless device mayvibrate, flip, move in a spe-
`cific direction,etc., in response to a variety of conditions. For
`example, a camera associated with the wireless device may be
`facing downorin a direction that does not assist in location.
`In such an example, the wireless device may attempt to adjust
`its physical positioning so as to more readily facilitate locat-
`ing the wireless device. In another example, the device may
`include an actuator connectedto an arm, suchasa flip portion
`of the device, and activation of the position modification
`module 209 may energize actuator to automatically moveflip
`portion, for example, in an effort to change a position of the
`device, e.g. to change a side of the device including the
`camera from facing downto facing up or facing sideways. In
`another example, if an image taken is “black” (e.g. camerais
`covered or lying face down on ground), the target WCD may
`activate the position modification module 209. In such an
`example, a “black” image maybe defined as where a majority
`of pixels in a digital image are black oroff.
`[0042]
`In one aspect, other locating-related routine 32 may
`include an uncertainty zone module 213 for determining an
`“uncertainty zone.” As used with respect to this aspect, an
`uncertainty zone may be defined as a geographic region of
`defined dimensions within which the exact location of the
`
`wireless device may not be determined. For example, GPS
`aided tracking of the wireless device may provide specific
`latitude and longitude coordinates, however, there may be a
`degree of uncertainty with respect to such coordinates, e.g.
`based on the precision ofthe system or based on lack of some
`coordinates. For example, latitude and longitude coordinates
`maycorrespond to a high rise building, and the uncertainty
`zone may includeat least a portion of the high-rise building,
`e.g. such as a floor within the building when the GPS infor-
`mation does not include an altitude. In another example,
`specified latitude and longitude coordinates may be provided
`although a device being used to find those coordinates may
`not be able to exactly determine its own location. In such an
`instance, the uncertainty zone may be defined by the search-
`ing device locational accuracy. In one aspect, the wireless
`
`
`
`US 2010/0273452 Al
`
`Oct. 28, 2010
`
`device may transmit location informationto aid in det