[go: up one dir, main page]

WO2015014075A1 - A method and apparatus for an alarm for a mobile device - Google Patents

A method and apparatus for an alarm for a mobile device Download PDF

Info

Publication number
WO2015014075A1
WO2015014075A1 PCT/CN2013/089511 CN2013089511W WO2015014075A1 WO 2015014075 A1 WO2015014075 A1 WO 2015014075A1 CN 2013089511 W CN2013089511 W CN 2013089511W WO 2015014075 A1 WO2015014075 A1 WO 2015014075A1
Authority
WO
WIPO (PCT)
Prior art keywords
operating status
mobile device
data
status data
historical operating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2013/089511
Other languages
French (fr)
Inventor
Yanshan Shi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Publication of WO2015014075A1 publication Critical patent/WO2015014075A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0407Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis
    • G08B21/0423Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis detecting deviation from an expected pattern of behaviour or schedule

Definitions

  • the present invention relates to the field of mobile communication devices, particularly a method and apparatus for an alarm for a mobile device.
  • smart mobile device continues to increase with the advances in communication technology. They come in an ever-increasing array of forms, including smart phones, tablet computers with communication capabilities and watches with communication, navigation and medical testing functions.
  • the major operating systems for smart devices include Apple's iOS, Google-backed Android and Microsoft's Windows Phone.
  • Smart devices are typically characterized by having a substantial number of peripheral devices and a broad range of applications. They are often equipped with GPS systems, blue tooth, WiFi, FM radio, high resolution cameras and large touchscreens, and support one or more of the various communication modes such as 2G systems including GSM, GPRS and EDGE, and 3G systems including WCDMA, CDMA2000 and TD-SCDMA. Some also support the LTE system.
  • a gravity sensor works using piezoelectricity. With the standard application for a gravity sensor, the screen display rotates in sync with the device itself when the smart device rotates by about 90 degrees, so that the information shown on the screen, such as text, is maintained in a state that is parallel to gravity, i.e. from top to bottom.
  • An acceleration sensor is an electronic instrument measuring acceleration.
  • a directional sensor detects what direction the device is positioned in, which is not the commonly understood function of a compass.
  • a directional sensor is more properly called an angular velocity sensor.
  • a triaxial gyroscope detects positions in six different directions, along with mobile tracks and acceleration.
  • a distance sensor uses the principle of time measurement to find distance as a means of detecting the distance of an object. When making a call the screen on the cell phone will automatically turn off, but when the face of the caller moves away from the phone the screen will automatically come back on again and unlock.
  • a light sensor adjusts the brightness of the screen based on the degree of brightness of the light around it.
  • An electronic compass also known as an azimuth sensor or a digital compass, utilizes the geomagnetic field to establish the North Pole. Smart devices can be equipped with all or a portion of the aforementioned sensors.
  • Smart devices usually come with a large capacity battery and a large capacity storage unit such as a 4 GB to 32 GB SD card.
  • Large capacity storage units can be internal or external. Internal storage units are installed internally in smart devices as part of their hardware, while external storage devices can be independently extracted and replaced, in which case the smart devices need only provide the capability for reading from and writing to said equipment such as an SD card slot.
  • Operating systems for mobile devices provide a lock screen function to prevent losses caused by losing a cell phone. Users can specify images and passwords that are required to unlock the screens so that it is difficult for other people to unlock them, making it impossible for them to use their devices. This is a preliminary form of protection for the data stored on the internal storage unit of the device, but naturally it cannot defend against cracking the locked screen by wiping the device. Privacy protection and anti-theft applications can be installed on smart devices in the form of cell phone guard software. With these types of software users can set up passwords with respect to the running authority of designated data and applications.
  • They also feature functions such as sending a text message to a designated number when a new card is installed in a phone; when said message is received, performing specific operations including, for example, a positioning application will proceed, and location information will be sent to a designated number, or a photograph will be taken and said photograph will be sent to a designated number, or a warning sound will be emitted when data on the phone is destroyed, etc.
  • Said security functions may comprise warnings, monitoring or remote control in cases where a parent wishes to be made aware when her/his child's whereabouts no longer conform to the child's normal range of day-to-day activities.
  • Alarms, data acquisition and remote control for devices are useful when users are caught in unusual circumstances and cannot operate their cell phones, such as during a kidnapping or following an accident.
  • methods or devices with these sorts of alarm functionality that meets these requirements do not currently exist.
  • the present invention solves the need for an alarm for a mobile device and controlling the mobile device remotely when the mobile device is lost or in an abnormal operational state or environment.
  • the present invention provides a method for an alarm for a mobile device comprising the following:
  • said historical operating status data comprises the operating status data when the screen of the mobile device is in an unlocked state.
  • said current operating status data comprises the operating status data when the screen of the mobile device is in a locked state.
  • said operating status data comprises one or more of the following: hardware data, location data and communication service application data.
  • Said hardware data comprises the locked status of the screen and/or the motion status of the mobile device;
  • said location data comprises one or more of the following: the identification data for the cell the mobile device is resident in, the access point of the connected WiFi and the GPS positioning data for the current location;
  • saidcommunication service application data comprises the call log for the mobile device and/or the text message log.
  • the statistical analysis of said location data comprises one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration corresponding to the GPS positioning data for the current location.
  • said current operating status data comprise one or more of the following: hardware data, location data and communication service application data.
  • Said hardware data comprises the locked status of the screen and/or the motion status of the mobile device;
  • said location data comprises one or more of the following: the ID data for the cell the mobile device is resident in, the access point of the connected WiFi and the GPS positioning data for the current location;
  • said communication service application data comprises the call log for the mobile device and/or the text message log.
  • Said statistical analysis of said location data consists of one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration of the mobile device in the area corresponding to the location data as determined by the GPS positioning.
  • said cell ID data includes the cell ID (aka "cell identity"), the location area identification (LAI) and the routing area identification (RAI); and said WiFi access point information includes the service set identifier (SSID) or the basic service set identifier (BSSID).
  • cell identity aka "cell identity”
  • LAI location area identification
  • RAI routing area identification
  • WiFi access point information includes the service set identifier (SSID) or the basic service set identifier (BSSID).
  • the screen of the mobile device is not unlocked within a first designated period of time; the current operating status data when the screen of the mobile device is in a locked state does not appear in the historical operating status data and/or the statistical analysis of the historical operating status data stored when the screen was in an unlocked state within a second designated period of time.
  • the period of time measured within said first designated period of time is the time elapsed since the mobile device was turned on
  • the period of time measured within said second designated period of time is the time elapsed since the mobile device was turned on.
  • one or more of the following are sent to a designated contact: a location, a photograph which has been taken, or predetermined alarm data;
  • said instructions include one or more of the following: uploading, deleting, encrypting data or emitting an alarm sound.
  • uploading in addition to storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, the date and time of the historical operating status data are stored, and the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data stored prior to a third designated period of time are deleted.
  • the present invention also provides an apparatus for an alarm for a mobile device comprising a storage unit, an alarm control unit and an operating status data acquisition unit.
  • the operating status data acquisition unit acquires the current operating status data from the mobile device.
  • the alarm control unit analyzes the data acquired by the operating status data acquisition unit and stores it in the storage unit, and then compares the mobile device's current operating status data and the data stored on the storage unit to determine whether an abnormal event has occurred to the mobile device.
  • the device is switched into alarm mode if an abnormal event has occurred.
  • the apparatus further includes a settings unit for configuring a designated time and/or emergency contacts and outputting said designated data to the storage unit for storing.
  • the current operating status data of the mobile device is compared with the stored historical operating status data and/or the statistical analysis of the historical operating status data to determine whether an abnormal event has occurred. This is advantageous because an alarm message will be sent out when the mobile device is lost or misplaced, or when the user cannot operate it. Conditions for triggering an alarm are kept secret, which is particularly advantageous under certain circumstances.
  • the present invention solves the need for an alarm for a mobile device and controlling the mobile device remotely when the mobile device is lost or in an abnormal operational state or environment.
  • FIG. 1 is a schematic flow chart of Embodiment 1 of the present invention.
  • Step 1 (101 ): Determine whether the screen is in an unlocked state. If it is, perform Step 2. If not, perform Step 3.
  • Step 2 (103) Store the current operating status data as the historical operating status data for the mobile device, and/or update and store the statistical analysis of the historical operating status data, then complete said update process.
  • Step 3 (105) Compare the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data to check for abnormalities in the current operating status data for the mobile device. Perform Step 4 if there are any abnormalities. If not, complete the update to the operating status.
  • the historical aspect of the historical operating status data refers to data from prior to the present moment, though it may also further include data from the present moment as well.
  • the stored historical operating status data comprises the operating status data or the statistical analysis of said data from prior to the present moment, though it may also further include current operating status data and the updated statistical analysis of the current operating status data. Once the current operating status data is saved it turns into historical operating status data or a portion of the statistical analysis of the operating status data.
  • Said method illustrates the process for one instance of an operating status update.
  • There are multiple causes for triggering an update which can be classed as periodic or event-triggered.
  • An example of a periodic update is when said process is performed once every 10 minutes.
  • An event-triggered update for the mobile device triggers the aforementioned process when the following events occur: the device is turned on, the device is turned off, the screen is unlocked, the screen is locked, cell update, location area update or router area update occurs in a cellular communication network, the mobile device accesses a WiFi network or disconnects form a WiFi network, the GPS is turned on or off, there is a change to the GPS positioning data, a telephone call is made or received, and a text message is sent or received.
  • Said operating status data includes hardware data, location data and/or communication service application data.
  • the residence duration in the location data area can also be analyzed and stored.
  • the area where the location data, such as PGS positioning data, is derived from can be determined using various methods.
  • the latitude and longitude of the given location data can be defined as a center with a radius of 1 km.
  • the latitude and the longitude of the mobile device's GPS location data is located less than 1 km from said center it is deemed to be within said area, and the residence time for the mobile device at any position within 1 km of said center is assigned to the area corresponding to said center.
  • the shape of said area can also be a polygon formed by multiple location data.
  • the screen in Step 2 is in an unlocked state.
  • the mobile device acquires the current resident cell ID it will also acquire the access point's SSID if it gains WiFi access.
  • the frequency number which has been stored will be increased by 1 if said cell ID or SSID is found in the stored statistical analysis. Within this statistical analysis there is a corresponding relationship between the frequency and the residence or connection duration. If said cell ID or SSID is not found, then said cell ID or SSID is stored and the frequency number is stored as 1.
  • Said stored data can further include the status of the screen as unlocked.
  • Step 3 the methods for checking for abnormalities in the current operating status data for the mobile device including the following: if the current cell ID, LAI, SSID and the current location data area appear in the stored data, then the current operating status data is deemed to be normal. However, if the current cell ID, LAI, SSID and location data area have not been stored when the screen is in a locked state, then the current cell ID, LAI, SSID and location data area are stored, the screen status corresponding to them is stored as locked, and the corresponding frequency number is designated as 1. Otherwise, "1 " is added to the frequency number corresponding to the current cell ID, LAI, SSID and location data area when the screen is in a locked state. When the frequency number for the current cell ID, LAI, SSID current location data area is lower than the designated frequency number, e.g., it is at 50, it is determined to be normal. If not, then the current operating status data is deemed to be abnormal.
  • Step 3 there are multiple ways of determining whether there are any abnormalities in the current operating status data.
  • a first designated period can be 24 hours.
  • the continuous locked state of the screen is then measured, and if it exceeds said first designated period it will be deemed abnormal.
  • the current operating status data can be analyzed with the screen in a locked state, and if the stored operating status data with the screen in an unlocked state does not appear for a continuous period that exceeds a second designated period, such as 24 hours, then it will be deemed abnormal. For example, while the screen was in an unlocked state, if for a continuous period of 24 hours the mobile device has not accessed the WiFi access point that was previously accessed or the cell in which it was resident, then it will be deemed abnormal.
  • the mobile device's communication service application data can be used to determine whether there is any abnormality. For example, the calls made or received for the mobile device or the contacts who have sent text messages are stored, and the corresponding communication frequency and the date of the latest communication are recorded. Statistical results occurring before a third designated period are deleted, for example, 150 days, and the contacts are listed in the order based on the frequency of communication, from largest to smallest. When determining whether an abnormality has occurred, a check is made to see if any one contact out of the first N of said list of contacts, for example the first 50, has communicated with the mobile device within the most recent second designated continuous period. If yes, then the status is deemed normal, otherwise it is deemed abnormal.
  • the communication service application data may also be determined abnormal by checking to see if communication has been made by a designated emergency contact within the second designated continuous period of time. For example, a user's parents' telephone number may be designated as the emergency contacts, and the device will be switched into alarm mode if no contact has been made with the parents within 24 hours.
  • Step 4 the operation for switching into alarm mode comprises encrypting the data stored on a storage apparatus and sending an alarm message to an emergency contact.
  • a text message will then be sent from the emergency contact's number containing instructions, and the device will perform operations given in said instructions, which may include encryption, deletion, taking a photograph, sending out an alarm, uploading data, establishing the position of the device or uploading location data.
  • One advantage of the present embodiment is that the mobile device will be switched into alarm mode when the user has not unlocked the mobile device for a long period of time and has not sent or received messages or calls from designated contacts, and/or the mobile device appears to be outside of the normal daily geographical range of the user for a long period of time. This is advantageous because an alarm message is sent out when the mobile device is lost or misplaced, or when the user cannot operate the mobile device.
  • the conditions for triggering an alarm are kept secret, which is particularly advantageous for alarms required in certain environments.
  • Embodiment 2 provides an apparatus for an alarm for a mobile device of the present invention.
  • the alarm apparatus for a mobile device comprises a settings unit 201 , a storage unit 203, an alarm control unit 205 and an operating status data acquisition unit 207.
  • the settings unit 201 is used to configure the designated period of time and the emergency contacts of Embodiment 1 and to output the settings data to the storage unit 203 to be stored.
  • the operating status data acquisition unit 207 acquires the current status data from the mobile device including location data, communication service application data and screen lock status data.
  • the alarm control unit 205 analyzes and stores the data acquired by the operating status data acquisition unit to the storage unit 203. It also determines whether the current operating status is abnormal using the data stored in storage unit 203. If it is abnormal the mobile device will be switches into alarm mode.
  • the advantages of the present invention are that it incorporates the user's daily habits, such as which contacts the user typically communicates with, which cell the device is normally resident in, which areas it generally appears in and how often the phone is unlocked and used, to determine whether anything is unusual about the current status of the mobile device. If the circumstances are deemed abnormal then the device will be switched into alarm mode.
  • the traditional technology simply judges whether a password has been entered incorrectly for a given number of times or whether a SIM card has been changed before it determines that a device should be switched into alarm mode.
  • the method of the present invention delays putting the mobile device into alarm mode longer than the traditional technology, the conditions for triggering an alarm are secret, which is particularly advantageous under certain circumstances such as if the user is kidnapped and held for a long period of time and cannot operate a mobile device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a method and apparatus for an alarm for a mobile device. Said method includes storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, and comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data to determine whether an abnormal event has occurred. The device will be switched into alarm mode if an abnormal event has occurred. Said method determines whether an abnormal event has occurred to the current status of the mobile device based on a user's daily habits, and the mobile device is switched into alarm mode if any abnormal event has occurred. Conditions for triggering an alarm are kept secret, which is particularly advantageous for alarms required in certain environments.

Description

A METHOD AND APPARATUS FOR AN ALARM FOR A MOBILE DEVICE
F I E LD OF TH E I NVENTI ON
The present invention relates to the field of mobile communication devices, particularly a method and apparatus for an alarm for a mobile device. BACKG ROU N D
The appeal of smart mobile device continues to increase with the advances in communication technology. They come in an ever-increasing array of forms, including smart phones, tablet computers with communication capabilities and watches with communication, navigation and medical testing functions. The major operating systems for smart devices include Apple's iOS, Google-backed Android and Microsoft's Windows Phone. Smart devices are typically characterized by having a substantial number of peripheral devices and a broad range of applications. They are often equipped with GPS systems, blue tooth, WiFi, FM radio, high resolution cameras and large touchscreens, and support one or more of the various communication modes such as 2G systems including GSM, GPRS and EDGE, and 3G systems including WCDMA, CDMA2000 and TD-SCDMA. Some also support the LTE system. There are thousands of applications that can be downloaded from the web and installed on cell phones, including map navigation, cell phone banking and games.
Various types of sensors can be put into smart devices, including gravity sensors, acceleration sensors, directional sensors, triaxial gyroscopes, distance sensors, light sensors and electronic compasses. A gravity sensor works using piezoelectricity. With the standard application for a gravity sensor, the screen display rotates in sync with the device itself when the smart device rotates by about 90 degrees, so that the information shown on the screen, such as text, is maintained in a state that is parallel to gravity, i.e. from top to bottom. An acceleration sensor is an electronic instrument measuring acceleration. A directional sensor detects what direction the device is positioned in, which is not the commonly understood function of a compass. Rather, it can detect whether the device is vertically upright, vertically upside down, horizontally to the left, horizontally to the right, lying face up or lying face down. A directional sensor is more properly called an angular velocity sensor. A triaxial gyroscope detects positions in six different directions, along with mobile tracks and acceleration. A distance sensor uses the principle of time measurement to find distance as a means of detecting the distance of an object. When making a call the screen on the cell phone will automatically turn off, but when the face of the caller moves away from the phone the screen will automatically come back on again and unlock. A light sensor adjusts the brightness of the screen based on the degree of brightness of the light around it. An electronic compass, also known as an azimuth sensor or a digital compass, utilizes the geomagnetic field to establish the North Pole. Smart devices can be equipped with all or a portion of the aforementioned sensors.
Smart devices usually come with a large capacity battery and a large capacity storage unit such as a 4 GB to 32 GB SD card. Large capacity storage units can be internal or external. Internal storage units are installed internally in smart devices as part of their hardware, while external storage devices can be independently extracted and replaced, in which case the smart devices need only provide the capability for reading from and writing to said equipment such as an SD card slot.
Costs are obviously higher for smart devices than for cell phones with traditional functions, and they provide stronger processing capabilities, more comprehensive functionality and the ability to store and handle greater amounts of data and information. This also means that losing a smart device is a greater loss to a consumer. The primary loss is the cost of purchasing a new device, though there are also risks associated with the data stored on the storage unit of the lost device. Said risks are characterized by the following: the risk of thedisclosure of private information or commercial secrets; and the risk of the destruction of data, such as audio-visual evidence can be deleted by other people resulting from losing the device.
Operating systems for mobile devices provide a lock screen function to prevent losses caused by losing a cell phone. Users can specify images and passwords that are required to unlock the screens so that it is difficult for other people to unlock them, making it impossible for them to use their devices. This is a preliminary form of protection for the data stored on the internal storage unit of the device, but naturally it cannot defend against cracking the locked screen by wiping the device. Privacy protection and anti-theft applications can be installed on smart devices in the form of cell phone guard software. With these types of software users can set up passwords with respect to the running authority of designated data and applications. They also feature functions such as sending a text message to a designated number when a new card is installed in a phone; when said message is received, performing specific operations including, for example, a positioning application will proceed, and location information will be sent to a designated number, or a photograph will be taken and said photograph will be sent to a designated number, or a warning sound will be emitted when data on the phone is destroyed, etc.
In addition to anti-theft-related security issues, there are other cases where cell phones require security, such as unusual events related to the territory they are active in or their operational status. Said security functions may comprise warnings, monitoring or remote control in cases where a parent wishes to be made aware when her/his child's whereabouts no longer conform to the child's normal range of day-to-day activities. Alarms, data acquisition and remote control for devices are useful when users are caught in unusual circumstances and cannot operate their cell phones, such as during a kidnapping or following an accident. However, methods or devices with these sorts of alarm functionality that meets these requirements do not currently exist.
BRI E F SU M MARY OF TH E D I SC LOSU RE The present invention solves the need for an alarm for a mobile device and controlling the mobile device remotely when the mobile device is lost or in an abnormal operational state or environment.
To realize said objective, the present invention provides a method for an alarm for a mobile device comprising the following:
storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data;
comparing the mobile device's current operating status data and the data stored on the storage unit to determine whether an abnormal event has occurred to the mobile device; switching the mobile device into alarm mode if an abnormal event has occurred.
Optionally, in the step of storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, said historical operating status data comprises the operating status data when the screen of the mobile device is in an unlocked state.
Optionally, in the step of comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data, said current operating status data comprises the operating status data when the screen of the mobile device is in a locked state.
Optionally, in the step of storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, said operating status data comprises one or more of the following: hardware data, location data and communication service application data. Said hardware data comprises the locked status of the screen and/or the motion status of the mobile device; said location data comprises one or more of the following: the identification data for the cell the mobile device is resident in, the access point of the connected WiFi and the GPS positioning data for the current location; and saidcommunication service application data comprises the call log for the mobile device and/or the text message log. The statistical analysis of said location data comprises one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration corresponding to the GPS positioning data for the current location.
Optionally, in the step of comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data, said current operating status data comprise one or more of the following: hardware data, location data and communication service application data. Said hardware data comprises the locked status of the screen and/or the motion status of the mobile device; said location data comprises one or more of the following: the ID data for the cell the mobile device is resident in, the access point of the connected WiFi and the GPS positioning data for the current location; and said communication service application data comprises the call log for the mobile device and/or the text message log. Said statistical analysis of said location data consists of one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration of the mobile device in the area corresponding to the location data as determined by the GPS positioning.
Optionally, said cell ID data includes the cell ID (aka "cell identity"), the location area identification (LAI) and the routing area identification (RAI); and said WiFi access point information includes the service set identifier (SSID) or the basic service set identifier (BSSID).
Optionally, the following steps are performed in whole or in part to determine whether an abnormal event has occurred:
the screen of the mobile device is not unlocked within a first designated period of time; the current operating status data when the screen of the mobile device is in a locked state does not appear in the historical operating status data and/or the statistical analysis of the historical operating status data stored when the screen was in an unlocked state within a second designated period of time.
Optionally, the period of time measured within said first designated period of time is the time elapsed since the mobile device was turned on, and the period of time measured within said second designated period of time is the time elapsed since the mobile device was turned on.
Optionally, the following operations are performed in whole or in part once the mobile device is switched into alarm mode:
one or more of the following are sent to a designated contact: a location, a photograph which has been taken, or predetermined alarm data;
an operation is performed according to instructions received from a designated contact.
Optionally, said instructions include one or more of the following: uploading, deleting, encrypting data or emitting an alarm sound. Optionally, in addition to storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, the date and time of the historical operating status data are stored, and the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data stored prior to a third designated period of time are deleted.
The present invention also provides an apparatus for an alarm for a mobile device comprising a storage unit, an alarm control unit and an operating status data acquisition unit. The operating status data acquisition unit acquires the current operating status data from the mobile device. The alarm control unit analyzes the data acquired by the operating status data acquisition unit and stores it in the storage unit, and then compares the mobile device's current operating status data and the data stored on the storage unit to determine whether an abnormal event has occurred to the mobile device. The device is switched into alarm mode if an abnormal event has occurred.
Optionally, the apparatus further includes a settings unit for configuring a designated time and/or emergency contacts and outputting said designated data to the storage unit for storing.
In the present invention the current operating status data of the mobile device is compared with the stored historical operating status data and/or the statistical analysis of the historical operating status data to determine whether an abnormal event has occurred. This is advantageous because an alarm message will be sent out when the mobile device is lost or misplaced, or when the user cannot operate it. Conditions for triggering an alarm are kept secret, which is particularly advantageous under certain circumstances.
BRI E F DESCR I PTI ON OF TH E DRAWI N GS The summary of the present invention given above and the specific embodiments given below are better understood when reviewed together with the drawings. It should be clarified that the drawings act only as examples of the present invention for which patent rights are being sought. Reference numbers in the drawings are used to indicate the same or similar elements. Figure 1 is a schematic flow chart of Embodiment 1 of the present invention; and Figure 2 is a schematic diagram of Embodiment 2 of the present invention.
DETAI LE D D ESCRI PTION
The detailed characteristics and features of the present invention given in the embodiments below are sufficient to allow anyone skilled in the art to understand the technical content of the present invention and to implement it. The specification, claims and drawings of the present invention allow those skilled in the art to readily understand the objectives and features of the present invention.
The description of at least one of the exemplary embodiments given below is explanatory only, and does not restrict the present invention and its application or use.
The present invention solves the need for an alarm for a mobile device and controlling the mobile device remotely when the mobile device is lost or in an abnormal operational state or environment.
EM BODI M E NT 1 Figure 1 is a schematic flow chart of Embodiment 1 of the present invention.
Step 1 (101 ): Determine whether the screen is in an unlocked state. If it is, perform Step 2. If not, perform Step 3.
Step 2 (103): Store the current operating status data as the historical operating status data for the mobile device, and/or update and store the statistical analysis of the historical operating status data, then complete said update process.
Step 3 (105): Compare the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data to check for abnormalities in the current operating status data for the mobile device. Perform Step 4 if there are any abnormalities. If not, complete the update to the operating status.
Step 4 (107): Switch into alarm mode. The historical aspect of the historical operating status data refers to data from prior to the present moment, though it may also further include data from the present moment as well. Similarly, the stored historical operating status data comprises the operating status data or the statistical analysis of said data from prior to the present moment, though it may also further include current operating status data and the updated statistical analysis of the current operating status data. Once the current operating status data is saved it turns into historical operating status data or a portion of the statistical analysis of the operating status data.
Said method illustrates the process for one instance of an operating status update. There are multiple causes for triggering an update, which can be classed as periodic or event-triggered.
An example of a periodic update is when said process is performed once every 10 minutes. An event-triggered update for the mobile device triggers the aforementioned process when the following events occur: the device is turned on, the device is turned off, the screen is unlocked, the screen is locked, cell update, location area update or router area update occurs in a cellular communication network, the mobile device accesses a WiFi network or disconnects form a WiFi network, the GPS is turned on or off, there is a change to the GPS positioning data, a telephone call is made or received, and a text message is sent or received.
Said operating status data includes hardware data, location data and/or communication service application data. There are multiple metrics for analyzing the location data. Examples include the duration or the frequency that the mobile device is resident in a given cell or connects to a given WiFi access point during a designated period, such as over a 7-day or 30-day period; the stored cell ID and the LAI, and the stored duration or frequency of residence corresponding to them; or the stored SSIDs of the WiFi access points and the stored duration or frequency of connections corresponding to them. The residence duration in the location data area can also be analyzed and stored. The area where the location data, such as PGS positioning data, is derived from can be determined using various methods. For example, the latitude and longitude of the given location data can be defined as a center with a radius of 1 km. When the latitude and the longitude of the mobile device's GPS location data is located less than 1 km from said center it is deemed to be within said area, and the residence time for the mobile device at any position within 1 km of said center is assigned to the area corresponding to said center. The shape of said area can also be a polygon formed by multiple location data.
The screen in Step 2 is in an unlocked state. When the mobile device acquires the current resident cell ID it will also acquire the access point's SSID if it gains WiFi access. The frequency number which has been stored will be increased by 1 if said cell ID or SSID is found in the stored statistical analysis. Within this statistical analysis there is a corresponding relationship between the frequency and the residence or connection duration. If said cell ID or SSID is not found, then said cell ID or SSID is stored and the frequency number is stored as 1. Said stored data can further include the status of the screen as unlocked.
In Step 3 the methods for checking for abnormalities in the current operating status data for the mobile device including the following: if the current cell ID, LAI, SSID and the current location data area appear in the stored data, then the current operating status data is deemed to be normal. However, if the current cell ID, LAI, SSID and location data area have not been stored when the screen is in a locked state, then the current cell ID, LAI, SSID and location data area are stored, the screen status corresponding to them is stored as locked, and the corresponding frequency number is designated as 1. Otherwise, "1 " is added to the frequency number corresponding to the current cell ID, LAI, SSID and location data area when the screen is in a locked state. When the frequency number for the current cell ID, LAI, SSID current location data area is lower than the designated frequency number, e.g., it is at 50, it is determined to be normal. If not, then the current operating status data is deemed to be abnormal.
In Step 3 there are multiple ways of determining whether there are any abnormalities in the current operating status data. For example, a first designated period can be 24 hours. The continuous locked state of the screen is then measured, and if it exceeds said first designated period it will be deemed abnormal. In another example, the current operating status data can be analyzed with the screen in a locked state, and if the stored operating status data with the screen in an unlocked state does not appear for a continuous period that exceeds a second designated period, such as 24 hours, then it will be deemed abnormal. For example, while the screen was in an unlocked state, if for a continuous period of 24 hours the mobile device has not accessed the WiFi access point that was previously accessed or the cell in which it was resident, then it will be deemed abnormal.
The shorter said first and second designated periods are, the more beneficial they are in promptly sending out alarm data, though the false alarm rate will also be higher.
In Step 3 the mobile device's communication service application data can be used to determine whether there is any abnormality. For example, the calls made or received for the mobile device or the contacts who have sent text messages are stored, and the corresponding communication frequency and the date of the latest communication are recorded. Statistical results occurring before a third designated period are deleted, for example, 150 days, and the contacts are listed in the order based on the frequency of communication, from largest to smallest. When determining whether an abnormality has occurred, a check is made to see if any one contact out of the first N of said list of contacts, for example the first 50, has communicated with the mobile device within the most recent second designated continuous period. If yes, then the status is deemed normal, otherwise it is deemed abnormal. The communication service application data may also be determined abnormal by checking to see if communication has been made by a designated emergency contact within the second designated continuous period of time. For example, a user's parents' telephone number may be designated as the emergency contacts, and the device will be switched into alarm mode if no contact has been made with the parents within 24 hours.
In Step 4 the operation for switching into alarm mode comprises encrypting the data stored on a storage apparatus and sending an alarm message to an emergency contact. A text message will then be sent from the emergency contact's number containing instructions, and the device will perform operations given in said instructions, which may include encryption, deletion, taking a photograph, sending out an alarm, uploading data, establishing the position of the device or uploading location data.
One advantage of the present embodiment is that the mobile device will be switched into alarm mode when the user has not unlocked the mobile device for a long period of time and has not sent or received messages or calls from designated contacts, and/or the mobile device appears to be outside of the normal daily geographical range of the user for a long period of time. This is advantageous because an alarm message is sent out when the mobile device is lost or misplaced, or when the user cannot operate the mobile device. The conditions for triggering an alarm are kept secret, which is particularly advantageous for alarms required in certain environments.
EM BODI M E NT 2
As shown in Figure 2, Embodiment 2 provides an apparatus for an alarm for a mobile device of the present invention. The alarm apparatus for a mobile device comprises a settings unit 201 , a storage unit 203, an alarm control unit 205 and an operating status data acquisition unit 207.
The settings unit 201 is used to configure the designated period of time and the emergency contacts of Embodiment 1 and to output the settings data to the storage unit 203 to be stored.
The operating status data acquisition unit 207 acquires the current status data from the mobile device including location data, communication service application data and screen lock status data.
The alarm control unit 205 analyzes and stores the data acquired by the operating status data acquisition unit to the storage unit 203. It also determines whether the current operating status is abnormal using the data stored in storage unit 203. If it is abnormal the mobile device will be switches into alarm mode.
The advantages of the present invention are that it incorporates the user's daily habits, such as which contacts the user typically communicates with, which cell the device is normally resident in, which areas it generally appears in and how often the phone is unlocked and used, to determine whether anything is unusual about the current status of the mobile device. If the circumstances are deemed abnormal then the device will be switched into alarm mode. The traditional technology simply judges whether a password has been entered incorrectly for a given number of times or whether a SIM card has been changed before it determines that a device should be switched into alarm mode. Even though the method of the present invention delays putting the mobile device into alarm mode longer than the traditional technology, the conditions for triggering an alarm are secret, which is particularly advantageous under certain circumstances such as if the user is kidnapped and held for a long period of time and cannot operate a mobile device.
The embodiments of the present invention are given in the aforementioned sequence in order to distinguish between their respective points of emphasis. The same or similar parts appearing in all of the embodiments will be readily apparent. The descriptions of the apparatus disclosed in the embodiments is comparatively brief because the methods given in the different embodiments all correspond to each other, therefore the nature of the apparatus will be readily apparent in those parts of the embodiments which refer to the methods.
The preferred embodiments of the present invention disclosed above do not limit the present invention. Those skilled in the art can make changes or modifications to it without departing from the spirit and scope of the present invention, therefore the claims of the present invention shall define the designated scope of protection for the present invention.

Claims

What is claimed is:
1. A method for an alarm for a mobile device, comprising the following:
storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data;
comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data to determine whether an abnormal event has occurred;
switching the mobile device into alarm mode if an abnormal event has occurred.
2. The method of claim 1 , wherein, in the step of storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, said historical operating status data comprises the operating status data when the screen of the mobile device is in an unlocked state.
3. The method of claim 1 , wherein, in the step of comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data, said current operating status data comprises the operating status data when the screen of the mobile device is in a locked state.
4. The method of claim 1 , 2 or 3, wherein, in the step of storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, said historical operating status data includes one or more of the following: hardware data, location data and communication service application data.
5. The method of claim 4, wherein said hardware data comprises the locked status of the screen and/or the motion status of the mobile device; said location data comprises one or more of the following: the ID data for the cell that the mobile device is resident in, the access point of the connected WiFi, the GPS positioning data for the current location; and said communication service application data comprises the call log for the mobile device and/or the text message log.
6. The method of claim 5, wherein the statistical analysis of said location data comprises one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration corresponding to the GPS positioning data for the current location.
7. The method of claim 1 , 2 or 3, wherein, in the step of comparing the current operating status data of the mobile device with the stored historical operating status data and/or the statistical analysis of the historical operating status data, said current operating status data comprise one or more of the following: hardware data, location data and communication service application data.
8. The method of claim 7, wherein said hardware data comprises the locked status of the screen and/or the motion status of the mobile device; said location data comprises one or more of the following: the ID data for the cell the mobile device is resident in, the connected WiFi access point and the GPS positioning data for its current location; and said communication service application data comprises the call log for the mobile device and/or the text message log.
9. The method of claim 8, wherein the statistical analysis of said location data comprises one or more of the following: the time duration corresponding to the ID data for the cell the mobile device is resident in, the time duration corresponding to the connection to the WiFi access point, and the time duration corresponding to the GPS positioning data for its current location.
10. The method of claim 1 , wherein the following steps are used in whole or in part to determine whether an abnormal event has occurred: the screen of the mobile device is not unlocked within a first designated period of time;
the current operating status data when the screen of the mobile device is in a locked state does not appear in the historical operating status data and/or the statistical analysis of the historical operating status data stored when the screen was in an unlocked state within a second designated period of time.
1 1. The method of claim 6, wherein the period of time measured within said first designated period of time is the time elapsed since the mobile device was turned on, and the period of time measured within said second designated period of time is the time elapsed since the mobile device was turned on.
12. The method of claim 1 , wherein the following operations are performed in whole or in part once the device is switched into alarm mode:
one or more of the following are sent to a designated contact: a location, a photograph which has been taken, or designated alarm data;
an operation is performed according to instructions received from a designated contact.
13. The method of claim 8, wherein said instructions comprises one or more of the following: uploading, deletion, encrypting data or emitting an alarm sound.
14. The method of claim 1 or 2, wherein, in addition to storing the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data, the date and time of the historical operating status data are stored and the historical operating status data for the mobile device and/or the statistical analysis of the historical operating status data stored prior to a third designated period of time are deleted.
15. An apparatus for an alarm for a mobile device comprising a storage unit, an alarm control unit and an operating status data acquisition unit, the operating status data acquisition unit for acquiring the current operating status data from the mobile device;
the alarm control unit for analyzing the data acquired by the operating status data acquisition unit and storing it in the storage unit, and then comparing the mobile device's current operating status data and the data stored on the storage unit to determine whether an abnormal event has occurred to the mobile device, and switching the mobile device into alarm mode if an abnormal event has occurred.
16. The apparatus of claim 15, further comprising a settings unit for configuring a designated time and/or emergency contacts and outputting said designated data to the storage unit for storing.
PCT/CN2013/089511 2013-08-01 2013-12-16 A method and apparatus for an alarm for a mobile device Ceased WO2015014075A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310333027.8 2013-08-01
CN201310333027.8A CN104348959B (en) 2013-08-01 2013-08-01 Mobile terminal alarm method and device

Publications (1)

Publication Number Publication Date
WO2015014075A1 true WO2015014075A1 (en) 2015-02-05

Family

ID=52430931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/089511 Ceased WO2015014075A1 (en) 2013-08-01 2013-12-16 A method and apparatus for an alarm for a mobile device

Country Status (2)

Country Link
CN (1) CN104348959B (en)
WO (1) WO2015014075A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292342A (en) * 2017-06-21 2017-10-24 广东欧珀移动通信有限公司 Data processing method and related product
CN109558719A (en) * 2019-01-03 2019-04-02 中国联合网络通信集团有限公司 Unlocking method and terminal
CN111145393A (en) * 2019-12-11 2020-05-12 国家电网有限公司 A method and system for monitoring abnormal operation of a power intelligent lock

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106154983A (en) * 2015-03-23 2016-11-23 昆达电脑科技(昆山)有限公司 Mutual detection method, mutual detection device and electric power management system
CN106485881A (en) * 2015-08-26 2017-03-08 中兴通讯股份有限公司 A kind of method and device of wireless network emergency alarm
CN105306697B (en) * 2015-09-30 2019-10-29 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN105653916A (en) * 2015-12-28 2016-06-08 惠州Tcl移动通信有限公司 Mobile terminal and screen unlocking method therefore based on position information
CN105791570B (en) * 2016-02-29 2020-02-21 宇龙计算机通信科技(深圳)有限公司 Early warning method and system for mobile terminal
CN109714466B (en) * 2017-10-26 2021-08-17 中国电信股份有限公司 Dynamic password authentication processing method and device and mobile terminal thereof
CN107942349A (en) * 2017-11-13 2018-04-20 东华大学 Theft protection for devices moving device based on GNSS
CN108156537B (en) * 2017-12-15 2020-01-07 维沃移动通信有限公司 A kind of remote operation method of mobile terminal and mobile terminal
CN108769429B (en) * 2018-06-20 2021-01-05 努比亚技术有限公司 Mobile terminal security mode starting method, mobile terminal and readable storage medium
CN111124844B (en) * 2018-10-30 2023-07-21 安碁资讯股份有限公司 Abnormal detection method and device for detecting abnormal operation of operating system
CN110225188A (en) * 2019-05-20 2019-09-10 联想(北京)有限公司 A kind of information processing method and device
CN110414603B (en) * 2019-07-29 2022-02-22 中国工商银行股份有限公司 Method, apparatus, computer system, and medium for detecting mobile device
CN111314556A (en) * 2020-02-17 2020-06-19 深圳传音控股股份有限公司 Alarm method for mobile terminal, mobile terminal and storage medium
CN111986460A (en) * 2020-07-30 2020-11-24 华北电力大学(保定) Smart Alarm Insole Based on Accelerometer

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778353A (en) * 2010-02-20 2010-07-14 华为终端有限公司 Automatic alarm method and terminal
JP2012244435A (en) * 2011-05-19 2012-12-10 Fujitsu Ltd Portable electronic device and alarm notification program
CN102946468A (en) * 2012-10-18 2013-02-27 广东欧珀移动通信有限公司 A method and system for automatically alarming abnormality of a mobile phone running program
CN103428335A (en) * 2012-05-17 2013-12-04 西安闻泰电子科技有限公司 Method for protecting user and cell phone

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6961001B1 (en) * 2002-03-29 2005-11-01 Bellsouth Intellectual Property Corporation Perimeter monitoring alarm method and system
KR100716403B1 (en) * 2005-10-01 2007-05-11 주식회사 케이티프리텔 Alert service method for specific location information of mobile terminal, management device and mobile terminal therefor
CN101604014B (en) * 2009-07-13 2013-01-16 中兴通讯股份有限公司 Monitoring and alarm method and apparatus using GPS positioning, and mobile phone
CN102316224B (en) * 2011-09-28 2013-09-11 深圳市赛格导航科技股份有限公司 Mobile phone alarm method and special mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778353A (en) * 2010-02-20 2010-07-14 华为终端有限公司 Automatic alarm method and terminal
JP2012244435A (en) * 2011-05-19 2012-12-10 Fujitsu Ltd Portable electronic device and alarm notification program
CN103428335A (en) * 2012-05-17 2013-12-04 西安闻泰电子科技有限公司 Method for protecting user and cell phone
CN102946468A (en) * 2012-10-18 2013-02-27 广东欧珀移动通信有限公司 A method and system for automatically alarming abnormality of a mobile phone running program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292342A (en) * 2017-06-21 2017-10-24 广东欧珀移动通信有限公司 Data processing method and related product
CN109558719A (en) * 2019-01-03 2019-04-02 中国联合网络通信集团有限公司 Unlocking method and terminal
CN109558719B (en) * 2019-01-03 2020-08-18 中国联合网络通信集团有限公司 Unlocking method and terminal
CN111145393A (en) * 2019-12-11 2020-05-12 国家电网有限公司 A method and system for monitoring abnormal operation of a power intelligent lock

Also Published As

Publication number Publication date
CN104348959A (en) 2015-02-11
CN104348959B (en) 2017-04-19

Similar Documents

Publication Publication Date Title
WO2015014075A1 (en) A method and apparatus for an alarm for a mobile device
US11902859B2 (en) Monitoring objects capable of wireless communications
US12154443B2 (en) Mobile aerial drone early warning privacy breach detect, intercept, and defend systems and methods
US20180260567A1 (en) Automatic protection system
CN104008624B (en) Anti-theft alarm device, system and system control method
CN106203012A (en) The processing method of screen locking, device and equipment
JP2018536216A (en) Techniques for entering code on a computing device
US20160343238A1 (en) Security and surveillance system based on intelligent mobile devices
EP3166294B1 (en) Systems and methods for monitoring and managing use of mobile electronic devices
TW201638827A (en) Method and apparatus for providing a security mechanism on a mobile device
US10009721B2 (en) Monitoring system and method with signal tampering detection
EP3120289A1 (en) Computing device security
CN104023315A (en) Password input method and device based on geographical location information
US11736900B2 (en) Guardian service provision system, program, and guardian service provision method
KR101411406B1 (en) System for providing caution-service for prevention against disasters
US20150026278A1 (en) Method and Device for Pushing User Message
US20190164401A1 (en) Object tracking system
CA2765980C (en) Method and system for heuristic location tracking
KR20180013279A (en) Mobile device and personal information protecting method
US11741206B2 (en) Secure electronic devices and methods
KR20150042918A (en) Terminal for ward and guarddian, cloud server, their method of operation and recording medium for safety management of ward
FR3011157A1 (en) METHOD AND TERMINAL FOR SENDING AN ELECTRONIC ALERT MESSAGE

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13890761

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13890761

Country of ref document: EP

Kind code of ref document: A1