WO2017127019A1 - A system and method for remotely controlling a mobile device - Google Patents
A system and method for remotely controlling a mobile device Download PDFInfo
- Publication number
- WO2017127019A1 WO2017127019A1 PCT/SG2016/050541 SG2016050541W WO2017127019A1 WO 2017127019 A1 WO2017127019 A1 WO 2017127019A1 SG 2016050541 W SG2016050541 W SG 2016050541W WO 2017127019 A1 WO2017127019 A1 WO 2017127019A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile phone
- remote control
- user
- service provider
- request
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 69
- 230000001413 cellular effect Effects 0.000 claims description 14
- 238000004891 communication Methods 0.000 claims description 11
- 230000003213 activating effect Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 5
- 230000000977 initiatory effect Effects 0.000 claims description 5
- IQVNEKKDSLOHHK-FNCQTZNRSA-N (E,E)-hydramethylnon Chemical compound N1CC(C)(C)CNC1=NN=C(/C=C/C=1C=CC(=CC=1)C(F)(F)F)\C=C\C1=CC=C(C(F)(F)F)C=C1 IQVNEKKDSLOHHK-FNCQTZNRSA-N 0.000 description 8
- 230000001276 controlling effect Effects 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 238000012217 deletion Methods 0.000 description 5
- 230000037430 deletion Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 206010000210 abortion Diseases 0.000 description 2
- 231100000176 abortion Toxicity 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/50—Connection management for emergency connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- the present invention relates to a system and method for communicating with a mobile phone and relates specifically, although not exclusively, to using the emergency call channel to issue commands to the mobile phone.
- Mobile phones are carrying more and more personal and sensitive information now, such as SMS (Short Message Service) messages, photos, credit card information, user names and passwords.
- SMS Short Message Service
- the popularity of mobile phones raises serious and yet unsolved concerns, particularly with respect to data security on stolen or lost devices.
- portable mobile phones are more easily lost and/or stolen compared to laptops or desktops.
- all the sensitive information such as contacts, messages, photos, credit card information and access identities, may fall into the hands of malicious people.
- a malicious attacker can use the data saved on the phone to impersonate the legal user and commit identity theft. Therefore, once the mobile phone is lost or stolen, the user may want to perform some remote controls on the device, e.g., data erasure, call blocking, even if he/she cannot get the phone back.
- SIM subscriber identity module
- the present invention was developed with a view to providing a solution that would alleviate these issues, by having a system and method that would allow mobile phone owners to remotely control a mobile phone even without the availability of Wi-Fi or SIM card access.
- a first advantage of the system in accordance with this invention is that the user of the mobile phone is able to remotely control a mobile phone quickly and securely. This is not preventable even through removing the SIM card or switching off the Wi-Fi for the mobile phone.
- a second advantage of the system in accordance with this invention is that it avoids accidental control operations resultant from changing of SIM card or not the SIM card suffering a failure. Once it is triggered, the remote control operations would be performed only if the user has already reported the loss to the system.
- a third advantage of the system in accordance with this invention is that only the legitimate user can activate the control operations remotely. This is further enhanced by having the external party blind to the ongoing operations.
- a system for remotely controlling a mobile phone comprising a mobile phone, a call control entity and a remote control service provider, where the remote control service provider is used to record information of a user and the mobile phone, receive a remote control service request from the user, record the remote control service request and associate the remote control service request with the mobile phone.
- the mobile phone is used to monitor the state of a subscriber identification module within the mobile phone, the subscriber identification module securely stores an international mobile subscriber identity (IMSI) number and a related key, the mobile phone is used to generate a remote control request indicator when the subscriber identification module is removed from a switched-on mobile phone or the mobile phone is powered on without an available subscriber identification module, the mobile phone making an emergency call to the call control entity with a generated remote control request indicator attached in an emergency call establishment message as a remote control request, the mobile phone receiving a remote control command from the call control entity and the mobile phone performing a local operation according to an instruction contained in the remote control command received.
- the call control entity is used to receive the remote control request indicator through receiving the emergency call establishment message from the mobile phone, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider, and the call control entity sending the remote control command to the mobile phone.
- the remote control service provider is also used to carry out a registration of the user and the mobile phone, wherein the user registers with the remote control service using identification information (e.g., ID card information) that can uniquely identify the user to the remote control service provider when the user can physically control the mobile phone and specify the type of remote control service to be activated, wherein the type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone.
- identification information e.g., ID card information
- the remote control service provider is also used to carry out an authentication on the user for a request initiating remote control to a mobile phone and record the received remote control service request only after the authentication is successful.
- the remote control service provider is also used to receive a message that contains the subscriber identification module re-inserted indication and the currently used IMSI number from the mobile phone, the remote control service provider is used to record the received IMSI number associated with the International Mobile Equipment Identity (IMEI) number of the mobile phone in the IMEI database, and confirm a state of the mobile phone with the user and send the remote control command to the mobile phone.
- IMEI International Mobile Equipment Identity
- the remote control service provider maintains an IMEI database that used to record the IMEI number, the state of the mobile phone and the IMSI number of the mobile phone, where the IMEI number of the mobile phone is recorded in the IMEI database and the state of the mobile phone is recorded as being physically controlled by the user associated with its IMEI number when the user completes the registration of the remote control service and the state of the mobile phone associated with the IMEI number is recorded as remote request approved to record the remote control service request after the remote service provider receives a remote control service request from the user and successfully authenticates the user and the state of the mobile phone is recorded as SIM card re-inserted after the remote service provider receives a message that contains the subscriber identification module re-inserted indication and the current in use IMSI number from the mobile phone and the state of the mobile phone is recorded as remote control service requested after the service provider receives a remote control request from the mobile phone, where the IMSI number of the mobile phone is recorded as the IMSI number used on the mobile phone when the user finishes
- the call control entity determines the user permission for the received remote control request that is sent by the mobile phone from the remote control service provider through checking the state of the mobile phone in the IMEI database of the service provider, then the call control entity sends the remote control command to the mobile phone when the state of the mobile phone is recorded as remote request approved in the IMEI database;
- the call control entity sends a remote control service rejection message to the mobile phone to rejecting its remote control service request when the state of the mobile phone is recorded as being physically controlled by the user in the IMEI database.
- the generated remote control request indicator is attached in the emergency call establishment message by assigning specific values for reserved bits in certain data fields in the emergency call establishment message.
- the remote control command is formatted through assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol.
- the mobile phone makes the emergency call with a remote control request indicator attached to the call control entity either only one time or several times until receiving the remote control command from the call control entity, wherein the frequency of making the said emergency call is set by either the user or the remote control service provider; if the mobile phone cannot receive a remote control command from the remote service provider in a time limit after making the emergency call with a remote control request indicator attached, the mobile phone requests for authentication from the user; if the user fails in the authentication, the mobile phone performs control operations automatically.
- the mobile phone makes an emergency call to the call control entity with the a remote control request indicator attached implicitly without any operation information displayed on the screen, and all call reminder functions are skipped when making the said emergency call.
- the remote control service provider checks the state of the mobile phone in the IMEI database before updates the state of the phone as remote control service approved when receives a lost report from the user: if the state of the mobile phone is recoded as physically controlled by the user or SIM card reinserted, the remote service provider uses the mobile phone's I MSI number recorded in the IMEI database to identify the phone and sends a remote control command to the phone through cellular network.
- the mobile phone activates user authentication after losing all network communication channels within a time period.
- the time period is defined by the user of the mobile phone.
- the mobile phone if the user fails in the user authentication, the mobile phone performs control operations automatically.
- the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice-based authentication, and face authentication.
- the method comprises the following steps: the remote control service provider receiving a remote control service request from a user and record the remote control service request and associate the remote control service request with the mobile phone, the mobile phone making an emergency call to the call control entity with a remote control request indicator attached in the emergency call as a remote control request, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider after receiving an emergency call with a remote control request indicator attached from the mobile phone, the call control sending a remote control command to the mobile phone if the remote control service request for the mobile phone sending by the user is recorded by the remote control service provider, and the mobile phone performing a local operation according to an instruction contained in the received remote control command.
- the method further comprises the step of registering the user a remote control service from the remote control service provider, the user providing identification information (e.g., ID card information) that can uniquely identify himself to the remote control service provider when the user can physically control the mobile phone and specifying the type of remote control service, wherein the type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone.
- identification information e.g., ID card information
- the method further comprises the step of the remote control service provider an authentication of a user who asks for initiating remote control to a mobile phone and recording the received remote control service request only after the authentication is successful.
- the method comprises the step of: the remote control service provider receiving a message that contains the subscriber identification module re-inserted indication and the currently used IMS I number from the mobile phone, the remote control service provider recording the received IMSI number associated with the IMEI number of the mobile phone in the IMEI database, the remote control service provider confirming the state of the mobile phone with the user registered and sending remote control command to the mobile phone.
- the method comprises the step of: the remote control service provider recording the IMEI number of the mobile phone and the state of the mobile phone associated with its IMEI number as being physically controlled by the user in a IMEI database when the user finishes the registration, and the remote control service provider recording the state of the mobile phone associated with the IMEI number as remote request approved after receiving a remote control service request from the user and successfully authenticating the user, and the remote control service provider recording the state of the mobile phone as SIM card reinserted after receiving a message that contains the subscriber identification module re-inserted indication and the currently used IMSl number from the mobile phone, and recording the state of the mobile phone as remote control service requested after receiving a remote control request from the mobile phone, where the remote service provider records the IMSl number of the mobile phone as IMSl number used on the mobile phone when the user finishes the registration, and recording the IMSl number of the mobile phone as the received IMSl number after receiving a message that contains the subscriber identification module re-inserted indication and the current used IMSl number from the
- the method comprises the step of: the call control entity sending an enquiry for user permission for the received remote control request through checking the state of the mobile phone which it received the remote control request from, where the call control entity sending the remote control command to the mobile phone, when the state of the mobile phone is recorded as remote request approved in the IMEI database; or the call control entity rejecting the remote control service request received from the mobile phone through sending a remote control service rejection message to the mobile phone when the state of the mobile phone is recorded as being physically controlled by the user in the IMEI database.
- the method comprises the step of: the mobile phone assigning specific values for reserved bits in certain data fields in an emergency call establishment message indicating a remote control service request when making the emergency call to the call control entity.
- the method comprises the step of: the call control entity assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol formatting the remote control command.
- the method comprises the step of: the mobile phone making the emergency call with a remote control request indicator attached to the call control entity according to a frequency set by either the user or the remote control service provider.
- the mobile phone performs an authentication for the user when the mobile phone cannot receive a remote control command from the remote service provider in a time period after making the emergency call with a remote control request indicator attached; and when the user fails in the authentication, the mobile phone performs a local operation automatically.
- the time period is defined by the user of the mobile phone.
- the method comprises the step of the mobile phone making the said emergency call implicitly, wherein no operation information is displayed on the screen and all call reminder functions are skipped.
- the method comprises the step of: the remote control service provider checking the state of the mobile phone in the IMEi database before updating the state of the phone as remote control service approved when receiving a lost report from the user, and the remote service provider using the mobile phone's IMSI number recorded in the IMEI database to identify the phone and sending a remote control command to the phone through cellular network when the state of the mobile phone is recoded as physically controlled by the user or SIM card re-inserted.
- the method comprises the step of: the mobile phone activating an authentication of the user after losing all network communication channels with the outside for a time period; if the user fails in the user authentication, the mobile phone performing local operation automatically.
- the time period is defined by the user of the mobile phone.
- the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice-based authentication, and face authentication.
- Figure 1 shows the framework of an embodiment of a system according to the present invention.
- Figure 2 shows the procedure of establishing an emergency call according to an embodiment of the present invention.
- FIGS 3 and 4 show the various stages of the method according to an embodiment of the present invention.
- Figure 5 shows an application view according to an embodiment of the present invention.
- Figure 6 shows a simplified application view according to an embodiment of the present invention.
- FIG. 7 shows a flowchart for a SIM card state monitoring module according to an embodiment of the present invention.
- Figure 8 shows a flowchart for a Wi-Fi availability detection module according to an embodiment of the present invention.
- Figure 9 shows a flowchart for an implicit dialling module according to an embodiment of the present invention.
- Figure 10 shows an example of the implicit dialling module according to an embodiment of the present invention.
- Figure 11 shows a procedure of remote control triggered by the owner according to another embodiment of the present invention.
- Figure 12 shows a procedure of automatic operations without remote input to an embodiment of the present invention.
- Figure 13 shows a procedure of remote triggering by reinserting the SIM card according to an embodiment of the present invention.
- Figure 14 shows a procedure of locally triggered control operations according to an embodiment of the present invention.
- the basic idea of the present system and method is to use the emergency channel as the communication channel between the remote mobile device and remote control service provider.
- the remote control commands are created by assigning specific values for reserved bits in emergency call establishment messages. This does not require an inserted SIM card or any available Internet connection on the mobile device.
- a user could ask the service provider for activating the remote control service once he/she realized that the registered device is out of his/her physical control. Once the SIM card is removed from a mobile device, the mobile device would make a special emergency call to the service provider requesting remote control service. Only if the mobile device sends a remote control service request to the service provider after the service provider has already received a remote control service request from the user, the service provider will send appropriate remote control commands to the mobile device.
- control command or operation carried out by the mobile device would be for the memory to be erased, and different levels of deletions can also be implemented depending on the conditions the system is triggered.
- a control command could send instructions to the mobile device to carry out a rapid deletion, although quick this could mean that an adversary may be able to recover the data.
- a more detailed or secure deletion can also be instructed to the mobile device, such that an adversary would not be able to recover the data.
- FIG. 1 shows a remote control service provider 100, a call control entity 110 that resides in a mobile cellular network, and a mobile phone 120 used by the owner.
- the remote control service provider 100 can also perform the functions of the call control entity 110.
- the owner or user 120 interacts with the remote control service provider 100 as follows:
- the user 120 subscribes to the remote control service specifying the type of the remote control service as locking the mobile phone, wiping the data on the mobile phone and locating the mobile phone or a combination of these services from the service provider 100 and registers the mobile phone when the phone is physically controlled by the user 120. After a successful registration, the remote control service provider records the lMEI number of the phone in the IMEI database and marks its state as being physically controlled by the user.
- the service provider 100 checks the state of the reported phone. If the state of the reported phone is recorded as being physically controlled by the user, the service provider changes the state of the reported phone in the IMEI database 105 by tagging it as remote request approved.
- the remove request approved means that the user approves control operations or local operations to be carried out on the mobile device remotely by the service provider.
- the service provider checks the state of the mobile device in the database for user permission.
- the service provider asks the call control entity 110 to send a remote control command to the phone through cellular network using the IMSI (International Mobile Subscriber Identity) number (i.e., phone number) that recorded in the IMEI database corresponding to the phone's IMEI number to identify the phone.
- IMSI International Mobile Subscriber Identity
- the service provider asks the call control entity to send a remote control command to the phone using the IMSI number recorded in IMEI database 105 corresponding to the phone's IMEI number to identify the phone.
- the service provider changes the state of the phone as remote request approved.
- the phone Upon receiving a remote control command using the IMSI number as the phone identity, the phone will immediately perform related operations according to the operation instruction contained in the received command.
- the International Mobile Subscriber Identity is an internationally standardized unique number to identify a mobile subscriber.
- the IMSI consists of a Mobile Country Code (MCC), a Mobile Network Code (MNC) and a Mobile Station Identification Number (MSIN).
- MCC Mobile Country Code
- MNC Mobile Network Code
- MSIN Mobile Station Identification Number
- IMEI International Mobile Equipment Identity
- a user 120 needs to subscribe to the remote control services before the phone gets lost. This can be done with the remote service provider through a registration process.
- the owner registers the service with identification information (e.g., ID card information) that can uniquely identify himself to the service provider and specify the type of remote control service according to the service category provided by the remote control service provider and personal requirements.
- ID card information e.g., ID card information
- the identity information can be submitted online or through any other specified way.
- the service provider records the IMEI number of the registered mobile phone and marks its state corresponding to the IMEI number as being physically controlled by the user in the IMEI database.
- Figures 3 and 4 show an example of using the system to remotely wipe out a mobile phone, in particular the smartphone, mobile phone or mobile device registration and report of loss.
- the mobile device owner 320 first registers with the Registration service of the Wipe-out service provider 300 and a customized application is installed, having been downloaded or preinstalled by the telecommunications provider.
- the device state would then be tagged in the IMEI database 305 as normal, i.e. the legal owner/user is in control of the mobile device, and the owner uses the mobile device as usual.
- the owner 322 reports the loss to the Wipe-out Service Provider 300, via an answering service which authenticates the identity of the owner reporting the loss.
- the IMEI database 305 is then checked and the status or the state of the mobile device is updated and tagged accordingly.
- Figure 4 shows what happens next as the application residing on the mobile device 430 makes a customized emergency call, even though the person who picked up the phone removes the SIM card or switches off the Wi-Fi.
- the customized emergency call is attached with a deletion indicator where customized values are assigned for the reserved bits, and the call control entity 400 receives this and checks with the IMEI database 405 regarding the state of the device.
- the IMEI database 405 reports back to the Call Control Entity 400 accordingly, and the Call Control Entity 400 sends a Wipe-out Command to the mobile device, by assigning a specific value for a special data field, in this example the call reject message. If the status is tagged as normal by the IMEI database 405, the Call Control Entity sends a call accepted message to the mobile device 430 and the mobile device 430 hangs up the customized emergency call. This status being tagged as lost or stolen can be made via a request or remote control request sent by the user through making a service call or reporting on the official website. Once the user report the loss and passes the authentication, the service provider will update the state of the reported phone as request approved (which is just a name of one state identified by us) indicating that this phone is reported to be lost or stolen by its legal user.
- the owner could request for activating the remote control service for the phone through a service call or web interface, or even the SMS.
- the specific way to report the theft is dependent on the specification of the service provider and personal preference.
- the remote service provider or call control entity taking the report from the owner can authenticate the user identity of the owner before recording the report and perform follow-up procedure, in case that the remote control is initiated by malicious people.
- the owner of the mobile device would provide identity information (e.g., ID card information), or specific answers to a security question that can be used to uniquely identify the owner to the service provider for the authentication process.
- the service provider may enhance the authentication process by challenging the reporter with certain specific questions, such as providing one phone number with the most frequent communication.
- the answers can be presented in a multiple-choice format for the user input via keypad.
- the service provider checks the state of the reported phone in the IMEI database. If the state of the phone is still tagged as being physically controlled by the user, the service provider updates the record of the mobile phone in the IMEI database by tagging its state as remote request approved. Meanwhile, the service provider asks the service provider to send a remote control command to the phone through cellular network using the IMSI number (i.e., phone number) that recorded together with the phone's IMEI number in the IMEI database to identify the phone. In this case, this IMSI number is recorded in the IMEI database when the phone is controlled by the user, which means that this IMSI number is the user's phone number used on the registered phone.
- the IMSI number i.e., phone number
- the re-inserted SIM card could be either the original SIM card or a new SIM card.
- the IMSI number recorded in the IMEI database is updated as the current in use IMSI number, once the service provider updates the state of the phone as SIM card re-inserted. Therefore, the IMSI number used in the remote control command which is send by the service provider could be either the user's original IMS! number or a new IMSI number.
- the mobile phone starts to make an emergency call with a remote control request indicator attached implicitly and automatically, asking for remote control command.
- This emergency call will be triggered by either of these events: the SIM card is removed from a switched-on smartphone or the smartphone is powered on with the SIM card unplugged.
- all ongoing procedures can be operated implicitly which means that all procedures run in the background, for example, the screen does not light up or provide any visual cues or information that the application is running in the background.
- the call control entity receives an emergency call with a remote control request indicator attached from a mobile phone, it will check the state of this phone in the IMEI database of the service provider using the following procedure:
- the mobile phone attaches a remote control request indicator to an emergency call, and makes this emergency call attempt on the mobile cellular network.
- the IMEI is used as the equipment identification.
- the call control entity checks the state of the mobile phone in the IMEI database of the service provider, after receiving the request for setting up a customized emergency call with a remote control request indicator attached.
- the call control entity sends the remote control command to the mobile phone corresponding to the remote request approved by the phone. Otherwise, if the state of the phone is recorded as being physically controlled by the user, the call control entity responds with a remote control request reject message and informs the service provider to update the state of the phone in the IMEI database as remote control service requested.
- the smartphone After receiving the remote control command, the smartphone performs the operations as instructed in the remote control command. If the smartphone receives the call accepted message (case 3), it ends the ongoing emergency call.
- the mobile phone Once the mobile phone detects the absence of the SIM card, it asks for remote control service through making an emergency call with a remote control request indicator attached.
- the remote control request indicator is attached by using reserved bits in certain data fields to assign specific values, which keeps the signal procedure of the emergency call for requesting remote control service consistent with the normal emergency call originated by a phone as defined in standard protocols. Therefore, the network carriers could support the disclosed method of remotely controlling a mobile phone without any change of current network structure, since the remote control request indicator is attached based on minimal modification of the implementation of current protocols.
- the call control entity When the call control entity receives an emergency call establishment message with a remote control indicator attached, it checks if the phone is indeed stolen trough querying the IMEI number and its state in the IMEI database of the service provider. After confirming the state of the phone by checking the IMEI number in the IMEI database of the service provider, the call control entity decides what operation instruction should be send to the mobile device as a response to its remote control request.
- the call control entity sends a remote control command to the phone.
- the remote control command is formatted through assigning a specific value for a special data field of the call reject message defined in the current call control protocol.
- the mobile phone Upon receiving the remote control command, the mobile phone starts to perform local operations according to the operation instructions given in the remote control command.
- the call control entity will send a remote control request rejected message to the mobile phone rejecting its remote control request. Meanwhile, the call control entity will inform the service provider to update the state of the phone as remote control service requested.
- the call accepted message consistent with the access permission for a legal emergency call originated by a phone without the SIM card can be used as the remote control request reject message, in order to keep the consistence with current protocol.
- the mobile phone upon receiving a call accept message as a response to the remote control request, terminates this emergency call releasing all occupied resources after receiving this message.
- the mobile phone can be set to make the emergency calls with a remote control request indicator attached to the call control entity only once or periodically by either the user or the remote control service provider.
- the mobile phone makes the emergency call with a remote control request indicator to the call control entity only once, which consumes little power.
- the phone will perform an authentication process and ask the user to provide a PIN code which is previously set by the user and saved in the phone. If the provided PIN code matches the saved PIN, no further operation will be performed. Otherwise, if the provided PIN code do not match the saved PIN, the remote control application will automatically perform the local control operations as the user subscribed during registration.
- time limit could be set by the user when the phone is physically controlled by the user.
- PIN-based user authentication could be replaced by other user authentication scheme, e.g., fingerprint- based authentication, graphical authentication, voice- based authentication, face authentication.
- the mobile phone can make the emergency calls asking for remote control command periodically until the reception of the remote control command.
- the frequency of making the customized emergency calls is dependent on the consideration on power consumption and security requirement.
- the higher frequency of making such emergency calls the higher possibility of performing remote control on the mobile phone before the user data on the phone has been transferred or leaked.
- high frequency results in high power consumption and heavy burden on network as well.
- the user could stop the phone to making such emergency calls through providing the correct PIN code, if the SIM card is removed by the user and the user does not want the phone to make such emergency call in the backstage.
- This PIN code could be either the same PIN code that used for prevent the phone from automatically performing control operations or another PIN code set by the user and saved in the phone when the phone is normally controlled by the user.
- PIN-based user authentication could be replaced by other user authentication scheme, e.g., fingerprint-based authentication, graphical authentication, geolocation authentication, voice-based authentication, face authentication etc.
- the mobile phone stops making the emergency call with a remote control request indicator attached and the ongoing emergency call for requesting remote control service is cancelled instantly.
- Figure 11 shows an embodiment of the invention where the remote control is triggered by the owner directly by reporting the loss, authenticating his identity and thereafter sending the remote command, possibly via the cellular network if available, to the mobile phone should the mobile phone be tagged as stolen.
- the mobile phones were initially tagged as physically controlled by the user or SIM card re-inserted until the user report the loss.
- the service provider changes the state of the phone to stolen (i.e., request approved).
- This request refers to the remote control service request sent by the legal user to the service provider where upon receiving such request (i.e., the loss report) from the legal user, the service provider will first check the state of the reported phone in the IMEI database.
- the service provider will ask the call control entity to send a remote control command to the phone via cellular network using the recorded IMSI to identify the mobile phone. After that, the service provider will change the state of the phone as request approved in its IMEI database. Otherwise, If the phone is tagged as remote control service requested (which means that the call control entity has received a remote control service request from the mobile phone) in the IMEI database when the user reports the loss and asks for activating remote control service, the service provider will just change the state of the phone to request approved without asking the call control entity to send a remote control command to the phone using IMSI number to identify the mobile phone.
- a SIM card is plugged in after the mobile phone has detected the absence of the SIM card, the mobile phone stops making the emergency call with a remote control request indicator attached and the ongoing emergency call for requesting remote control service terminates instantly. After that, the phone will immediately make an emergency call to the service provider using the IMEI number and/or IMSI number as device identity notifying the service provider that a SIM card is re-inserted in the phone.
- an indicator of SIM card re-inserting may be attached in the emergency call establishment message through assigning a special value for some reserved bits.
- the call entity receives an emergency call establishment request with a SIM card reinserting indication attached, it will notify the service provider to update the state of the phone as SIM card re-inserted and update the IMSI number of the phone as the IMSI number received in the call establishment message.
- the service provider updates the state of the phone as SIM card re-inserted, the service provider will contact the user to confirm the state of the phone using the contact methods provided by the user at registration, such as emergency contact number and emails. If the user confirms that the phone is lost, the service provider will ask the call control entity to send a remote control command to the phone using the updated IMSI number to identify the phone.
- the service provider will change the state of the phone as physically controlled by the user in its IMEI database.
- the state of the phone will remains as SIM card re-inserted in the IMEI database until either the user initiatively contact with the user or the service provider finally get in touch with the user through several contact attempts.
- the user can also specify the frequency and the number of contact attempts initiated by the service provider during registration.
- this invention supports remote control of a mobile phone through emergency channel even if the Wi-Fi connection is not available and the SIM card is unplugged, all network communication channel including emergency channel between the phone and the outside may be blocked in some situations, i.e., placing the phone in an electromagnetically shielded environment or configuring the phone to flight mode, as shown in Figure 12.
- the phone will request for authentication of the user. If the user passes the authentication and provides legal credentials, no further operations is performed on the phone.
- control operations which subscribed by the user in the registration will be automatically performed on the phone, which includes data wiping, screen locking, geolocation tracking, mobile device locking, or a hard reset of the mobile device or other operations that render the mobile device inoperative.
- the mobile device like a phone, can perform an authentication process locally on the mobile device and ask the user to provide a PIN code after losing all network communication channels with the outside. This can occur when the mobile device is located into an electromagnetically shielded environment or the mobile device being in the flight mode. If the provided PIN code matches the saved code that set previously by the legal user, and legai credentials are provided by the user, no further operations will be performed on the phone. However, if the provided PIN code does not match the saved PIN code, and illegal credentials are provided, the control operations which subscribed by the user in the registration will be automatically performed on the phone.
- the phone can authenticate the user with other user authentication scheme, e.g., fingerprint-based authentication, graphical authentication, geolocation authentication, voice-based authentication, face authentication.
- FIG. 2 An example of remotely controlling a mobile phone on the emergency call channel through making an emergency call in UMTS network is shown in Figure 2. While one embodiment in UMTS (Universal Mobile Telecommunications System) network has been provided in the present disclosure, it should be understood that the disclosed systems and methods may be embodied in many other network built under different mobile cellular system standard without departing from the spirit or scope of the present disclosure.
- UMTS Universal Mobile Telecommunications System
- the procedure of establishing an emergency call in UMTS network is shown in Figure 2, and the bordered words indicate the modifications for providing remote control service.
- the MS (Mobile Station) 210 is equivalent to the mobile phone and the call control entity is the MSC (Mobile Switching Center) 220.
- a remote control request indicator is attached to the "emergency setup" message by assigning a specific emergency service category value, indicating the type of requested remote control service.
- each bit of the emergency service category value stands for one emergency case.
- bit 8 is reserved and set to 0.
- Mobile station may set one or more bits to 1 to specify an emergency service category.
- the reserved bit of emergency service category value is set to 1 indicating that this emergency call is made to asking for remote control commands.
- other bits can be set to specific values indicating different operation request, e.g., data erasure, lock and location.
- the reserved bit of emergency service category value is set to 1 and this value is specified as "10000000" indicating emergency service for data erasure.
- the call control entity sends a "release" message to the mobile phone 210 with a specific value of the cause information element indicting the cause of rejecting this call.
- the cause information element in the "release" message is used to indicate the reason for the abortion.
- causes are customized as remote control commands through assigning specific values for the cause information element which are different from all abortion causes defined in UMTS specification.
- the call control entity Upon receipt of a "emergency setup" message with remote control request indicator attached, the call control entity checks the responded IMEl and its state in the database of the service provider. If the state of the mobile phone is stolen, the call control entity sends a "release" message to the phone with the special cause corresponding to the remote control service requested in the "emergency setup" message instructing the mobile device to perform related operation. For example, "01100111" which is distinguished from all existing cause values defined in UMTS specification could be assigned for the cause information element to define a specific cause "data erasure".
- the call control entity When the call control entity receives a data erasure indicator in an "emergency setup" message from a mobile device and the state of said mobile devices is verified as stolen, the call control entity sends a "release” message with the cause filed assigned as "01100111" indicating the mobile device 210 to perform data erasure operations.
- the mobile device 510 can have four units: a SIM card state monitoring unit 515, a Wi-fi availability detection unit 520, an implicit dialling unit 525 and a local operation unit 530.
- the location operation unit 530 would carry out local operations, for example secure wipe-out operations or erasing of data, when the appropriate command is provided by the wipe-out service provider 300. All of these units could run implicitly in the backstage to keep the person who is physically controlling the mobile device unrealized about the ongoing procedures for providing remote control service. These units can also run as normal applications in other embodiments.
- the mobile device 510 can have three units: a SIM card state monitoring unit 515, an implicit dialling unit 525 and a local operation unit 530. All of these units could run implicitly in the backstage to keep the person who is physically controlling the mobile device unrealized about the ongoing procedures for providing remote control service. These units can also run as normal applications in other embodiments.
- a SIM card state monitoring module shown in Figure 7 monitors the SIM card state. When the SIM card state changes, it will further detect the SIM card state. If the SIM card is determined to be absent, it will send a signal to emergency dialling unit indicating that the SIM card is absent. In another hand, this unit detects the SIM card state when the system boots up after the smartphone is powered or switched on. If the SIM card is absent, if a wi-fi availability module is present, it can send a signal using the wi-fi, otherwise a signal is sent to the emergency dialling unit or implicit dialling module indicating that the SIM card is absent. Moreover, this module keeps monitoring the state change of the SIM card, and if SIM card is re-plugged, the mobile device stops making customized emergency calls and an ongoing customized emergency call terminates.
- An emergency dialling unit or implicit dialling module shown in Figure 9 makes customized emergency calls by attaching an emergency service request indicator on an emergency call establishment message when the SIM card is unplugged. All call reminder procedures are skipped, and a deletion flag is attached to the emergency call. It will also analyse the responses from the remote control service provider to decide if a signal should be send to the local operation unit to activate related operation, for example to send a wipe-out command to secure wipe-out module, which is described elsewhere.
- An example running on Android operating system of the implicit dialling module is shown in Figure 10.
- a local operation unit starts to perform specific operations, i.e., locating, locking, data erasure, on the smartphone when the phone receives a remote control command from the service provider.
- specific operations i.e., locating, locking, data erasure
- this procedure cannot be interrupted for the purpose of ensuring a completed operation, except for power off or being out of battery. Even in this case, an unfinished operation procedure will automatically resume at the next boot until whole procedure for the specific operation is completed.
- the mobile device could also have a Wi-Fi availability detection unit shown in Figure 8.
- a Wi-Fi availability detection unit detects the availability of Wi-Fi connection after the SIM card is detected to be absent by the SIM card state monitoring unit. In this case, if the SIM card is absent, the SIM card state monitoring unit will send a signal to Wi- Fi availability unit indicating that the SIM card is absent. After receiving this signal, Wi-Fi availability detection unit detects the availability of Wi-Fi connection. If no Wi- Fi connection is present, this unit sends a signal to the emergency dialling unit or implicit dialling module to activate a customized emergency call. Moreover, this unit keeps monitoring the state of internet connection and an internet connection is built up, the smartphone stops making customized emergency calls and an ongoing customized emergency call terminates.
- This invention provides a system and method for remotely controlling mobile devices without SIM card and Internet connection.
- the basic idea is to use the emergency channel as the communication channel between the remote mobile device and remote control service provider.
- the user of the remote control service needs to register the mobile devices for such service when the mobile device is normally used by him/her.
- the user also needs to report the loss to the service provider once he/she realized that the registered device is lost asking for activating remote control service.
- the mobile device starts to make a customized emergency call attaching a remote control service request indicator in the emergency call establishment message.
- Such remote control service request indicator is attached by assigning specific values for reserved bits in the emergency call establishment massage.
- the remote service provider After receiving the remote control service request from the mobile devices, if the user has already asked for activating the remote control service, the remote service provider sends back remote service command by attaching such command to the response messages of the emergency call establishment massage.
- the remote service command is attached through assigning specific values for reserved bits in such response messages. Otherwise if the user has not activated the remote control service yet, the requested remote service will be denied.
- the mobile devices can be replaced with any computing device capable of communicating over a cellular network.
- the SIM card can be replaced by Removable User Identity Module (R-UIM) card, CDMA Subscriber Identify Module (CSIM), Universal Subscriber Identity Module (USIM), Universal Integrated Circuit Card (UICC) or similar cards. Therefore, it will be appreciated that the scope of the invention is not limited to the specific embodiments described.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
A system and method is described for remotely controlling a mobile phone with a mobile phone, a call control entity and a remote control service provider. The remote control service provider is used to record information of a user and the mobile phone, receive a remote control service request from the user, record the remote control service request and associate the remote control service request with the mobile phone. The mobile phone is used to monitor the state of a subscriber identification module within the mobile phone. The subscriber identification module securely stores an international mobile subscriber identity (IMS1) number and a related key, the mobile phone is used to generate a remote control request indicator when the subscriber identification module is removed from a switched-on mobile phone or the mobile phone is powered on without an available subscriber identification module. The mobile phone makes an emergency call to the call control entity with a generated remote control request indicator attached in an emergency call establishment message as a remote control request, the mobile phone receiving a remote control command from the call control entity and the mobile phone performing a local operation according to an instruction contained in the remote control command received. And the call control entity is used to receive the remote control request indicator through receiving the emergency call establishment message from the mobile phone, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider, and the call control entity sending the remote control command to the mobile phone.
Description
A SYSTEM AND METHOD FOR REMOTELY CONTROLLING A MOBILE
DEVICE
Field of the Invention
The present invention relates to a system and method for communicating with a mobile phone and relates specifically, although not exclusively, to using the emergency call channel to issue commands to the mobile phone.
Background to the Invention
Mobile phones are carrying more and more personal and sensitive information now, such as SMS (Short Message Service) messages, photos, credit card information, user names and passwords. The popularity of mobile phones raises serious and yet unsolved concerns, particularly with respect to data security on stolen or lost devices. Unfortunately, portable mobile phones are more easily lost and/or stolen compared to laptops or desktops. Once the mobile phones are stolen, all the sensitive information, such as contacts, messages, photos, credit card information and access identities, may fall into the hands of malicious people. Even worse, a malicious attacker can use the data saved on the phone to impersonate the legal user and commit identity theft. Therefore, once the mobile phone is lost or stolen, the user may want to perform some remote controls on the device, e.g., data erasure, call blocking, even if he/she cannot get the phone back.
Existing remote control solutions can only remotely control a mobile device which already has been plugged with a SIM (Subscriber Identity Module) card or connected to the Internet in order to send specific commands to the mobile device. For example, most common remote wipe mechanisms allow owners to remotely control the device by sending remote commands to the lost devices through the Internet or SMS. Unfortunately, sophisticated adversaries can defeat all existing remote control mechanisms by removing the SIM (Subscriber Identity Module) card and turning the Wi-Fi off. Once a mobile phone is stolen, since the adversary can physically access the device, he can remove the SIM card to disrupt normal communication through cellular network and disable or jam all the Wi-Fi
connections to the Internet. Thus, without receiving a command, the smartphone can never be remotely controlled by the owner. When the SIM card is unplugged, no normal call can be made since the service carrier needs the SIM card for authentication and billing. However, in some countries, telecommunications providers are required by the government or regulating authority to accept any and all emergency calls, regardless of the telecommunications provider or ceil phone plan, for example making emergency calls such as 911 in the United States of America. These emergency calls are made through an emergency call channel, which is specifically set aside and does not require a subscriber identity module (SIM) card to work.
The present invention was developed with a view to providing a solution that would alleviate these issues, by having a system and method that would allow mobile phone owners to remotely control a mobile phone even without the availability of Wi-Fi or SIM card access.
References to prior art documents in this specification are provided for illustrative purposes only and are not to be taken as an admission that such prior art is part of the common general knowledge in Singapore or elsewhere.
Summary of the Invention
The above and other problems are solved and an improvement in the art is made by a system in accordance with this invention. A first advantage of the system in accordance with this invention is that the user of the mobile phone is able to remotely control a mobile phone quickly and securely. This is not preventable even through removing the SIM card or switching off the Wi-Fi for the mobile phone. A second advantage of the system in accordance with this invention is that it avoids accidental control operations resultant from changing of SIM card or not the SIM card suffering a failure. Once it is triggered, the remote control operations would be performed only if the user has already reported the loss to the system. A third advantage of the system in accordance with this invention is that only the legitimate user can activate the control operations remotely. This is further enhanced by having the external party blind to the ongoing operations.
ln accordance with a first aspect of the present invention, there is a system for remotely controlling a mobile phone comprising a mobile phone, a call control entity and a remote control service provider, where the remote control service provider is used to record information of a user and the mobile phone, receive a remote control service request from the user, record the remote control service request and associate the remote control service request with the mobile phone. The mobile phone is used to monitor the state of a subscriber identification module within the mobile phone, the subscriber identification module securely stores an international mobile subscriber identity (IMSI) number and a related key, the mobile phone is used to generate a remote control request indicator when the subscriber identification module is removed from a switched-on mobile phone or the mobile phone is powered on without an available subscriber identification module, the mobile phone making an emergency call to the call control entity with a generated remote control request indicator attached in an emergency call establishment message as a remote control request, the mobile phone receiving a remote control command from the call control entity and the mobile phone performing a local operation according to an instruction contained in the remote control command received. The call control entity is used to receive the remote control request indicator through receiving the emergency call establishment message from the mobile phone, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider, and the call control entity sending the remote control command to the mobile phone.
In another embodiment, the remote control service provider is also used to carry out a registration of the user and the mobile phone, wherein the user registers with the remote control service using identification information (e.g., ID card information) that can uniquely identify the user to the remote control service provider when the user can physically control the mobile phone and specify the type of remote control service to be activated, wherein the type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone. In a further embodiment, the remote control service provider is also used to carry out an authentication on the user for a request
initiating remote control to a mobile phone and record the received remote control service request only after the authentication is successful. In an alternative embodiment, the remote control service provider is also used to receive a message that contains the subscriber identification module re-inserted indication and the currently used IMSI number from the mobile phone, the remote control service provider is used to record the received IMSI number associated with the International Mobile Equipment Identity (IMEI) number of the mobile phone in the IMEI database, and confirm a state of the mobile phone with the user and send the remote control command to the mobile phone.
In a further embodiment, the remote control service provider maintains an IMEI database that used to record the IMEI number, the state of the mobile phone and the IMSI number of the mobile phone, where the IMEI number of the mobile phone is recorded in the IMEI database and the state of the mobile phone is recorded as being physically controlled by the user associated with its IMEI number when the user completes the registration of the remote control service and the state of the mobile phone associated with the IMEI number is recorded as remote request approved to record the remote control service request after the remote service provider receives a remote control service request from the user and successfully authenticates the user and the state of the mobile phone is recorded as SIM card re-inserted after the remote service provider receives a message that contains the subscriber identification module re-inserted indication and the current in use IMSI number from the mobile phone and the state of the mobile phone is recorded as remote control service requested after the service provider receives a remote control request from the mobile phone, where the IMSI number of the mobile phone is recorded as the IMSI number used on the mobile phone when the user finishes the registration and the IMSI number of the mobile phone is updated as the received IMSI number after the service provider receives a message that contains the subscriber identification module re-inserted indication and the current in use IMSI number from the mobile phone.
In another embodiment, the call control entity determines the user permission for the received remote control request that is sent by the mobile phone from the
remote control service provider through checking the state of the mobile phone in the IMEI database of the service provider, then the call control entity sends the remote control command to the mobile phone when the state of the mobile phone is recorded as remote request approved in the IMEI database;
or the call control entity sends a remote control service rejection message to the mobile phone to rejecting its remote control service request when the state of the mobile phone is recorded as being physically controlled by the user in the IMEI database. In yet another embodiment, the generated remote control request indicator is attached in the emergency call establishment message by assigning specific values for reserved bits in certain data fields in the emergency call establishment message. In another further embodiment, the remote control command is formatted through assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol.
In another embodiment, the mobile phone makes the emergency call with a remote control request indicator attached to the call control entity either only one time or several times until receiving the remote control command from the call control entity, wherein the frequency of making the said emergency call is set by either the user or the remote control service provider; if the mobile phone cannot receive a remote control command from the remote service provider in a time limit after making the emergency call with a remote control request indicator attached, the mobile phone requests for authentication from the user; if the user fails in the authentication, the mobile phone performs control operations automatically.
In yet another embodiment, the mobile phone makes an emergency call to the call control entity with the a remote control request indicator attached implicitly without any operation information displayed on the screen, and all call reminder functions are skipped when making the said emergency call.
In further embodiments, the remote control service provider checks the state of the mobile phone in the IMEI database before updates the state of the phone as remote control service approved when receives a lost report from the user: if the state of
the mobile phone is recoded as physically controlled by the user or SIM card reinserted, the remote service provider uses the mobile phone's I MSI number recorded in the IMEI database to identify the phone and sends a remote control command to the phone through cellular network.
In another embodiment, the mobile phone activates user authentication after losing all network communication channels within a time period. In a further embodiment, the time period is defined by the user of the mobile phone. In yet another embodiment, if the user fails in the user authentication, the mobile phone performs control operations automatically.
In another embodiment, the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice-based authentication, and face authentication.
In accordance with an embodiment of the invention there is a method for remotely controlling a mobile phone, wherein the method is applied to a system comprising one or more mobile phones, a call control entity and a remote control service provider and comprises performing locking the mobile phone, wiping the data on the mobile phone and locating the mobile phone or a combination of these services, the method comprises the following steps: the remote control service provider receiving a remote control service request from a user and record the remote control service request and associate the remote control service request with the mobile phone, the mobile phone making an emergency call to the call control entity with a remote control request indicator attached in the emergency call as a remote control request, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider after receiving an emergency call with a remote control request indicator attached from the mobile phone, the call control sending a remote control command to the mobile phone if the remote control service request for the mobile phone sending by the user is recorded by the remote control service provider, and the mobile phone
performing a local operation according to an instruction contained in the received remote control command.
In another embodiment, the method further comprises the step of registering the user a remote control service from the remote control service provider, the user providing identification information (e.g., ID card information) that can uniquely identify himself to the remote control service provider when the user can physically control the mobile phone and specifying the type of remote control service, wherein the type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone.
In a further embodiment, the method further comprises the step of the remote control service provider an authentication of a user who asks for initiating remote control to a mobile phone and recording the received remote control service request only after the authentication is successful. In another embodiment, the method comprises the step of: the remote control service provider receiving a message that contains the subscriber identification module re-inserted indication and the currently used IMS I number from the mobile phone, the remote control service provider recording the received IMSI number associated with the IMEI number of the mobile phone in the IMEI database, the remote control service provider confirming the state of the mobile phone with the user registered and sending remote control command to the mobile phone.
In yet another embodiment, the method comprises the step of: the remote control service provider recording the IMEI number of the mobile phone and the state of the mobile phone associated with its IMEI number as being physically controlled by the user in a IMEI database when the user finishes the registration, and the remote control service provider recording the state of the mobile phone associated with the IMEI number as remote request approved after receiving a remote control service request from the user and successfully authenticating the user, and the remote control service provider recording the state of the mobile phone as SIM card reinserted after receiving a message that contains the subscriber identification
module re-inserted indication and the currently used IMSl number from the mobile phone, and recording the state of the mobile phone as remote control service requested after receiving a remote control request from the mobile phone, where the remote service provider records the IMSl number of the mobile phone as IMSl number used on the mobile phone when the user finishes the registration, and recording the IMSl number of the mobile phone as the received IMSl number after receiving a message that contains the subscriber identification module re-inserted indication and the current used IMSl number from the mobile phone.
In a further embodiment, the method comprises the step of: the call control entity sending an enquiry for user permission for the received remote control request through checking the state of the mobile phone which it received the remote control request from, where the call control entity sending the remote control command to the mobile phone, when the state of the mobile phone is recorded as remote request approved in the IMEI database; or the call control entity rejecting the remote control service request received from the mobile phone through sending a remote control service rejection message to the mobile phone when the state of the mobile phone is recorded as being physically controlled by the user in the IMEI database.
In yet another embodiment, the method comprises the step of: the mobile phone assigning specific values for reserved bits in certain data fields in an emergency call establishment message indicating a remote control service request when making the emergency call to the call control entity. In a further embodiment, the method comprises the step of: the call control entity assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol formatting the remote control command.
In yet a further embodiment, the method comprises the step of: the mobile phone making the emergency call with a remote control request indicator attached to the call control entity according to a frequency set by either the user or the remote control service provider. In a further embodiment the mobile phone performs an authentication for the user when the mobile phone cannot receive a remote control
command from the remote service provider in a time period after making the emergency call with a remote control request indicator attached; and when the user fails in the authentication, the mobile phone performs a local operation automatically. In another embodiment, the time period is defined by the user of the mobile phone. In yet another embodiment, the method comprises the step of the mobile phone making the said emergency call implicitly, wherein no operation information is displayed on the screen and all call reminder functions are skipped.
In another embodiment, the method comprises the step of: the remote control service provider checking the state of the mobile phone in the IMEi database before updating the state of the phone as remote control service approved when receiving a lost report from the user, and the remote service provider using the mobile phone's IMSI number recorded in the IMEI database to identify the phone and sending a remote control command to the phone through cellular network when the state of the mobile phone is recoded as physically controlled by the user or SIM card re-inserted.
In a further embodiment, the method comprises the step of: the mobile phone activating an authentication of the user after losing all network communication channels with the outside for a time period; if the user fails in the user authentication, the mobile phone performing local operation automatically. In another embodiment, the time period is defined by the user of the mobile phone.
In yet another embodiment, the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice-based authentication, and face authentication.
Throughout the specification, unless the context requires otherwise, the word "comprise" or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of
any other integer or group of integers. Likewise the word "preferably" or variations such as "preferred", will be understood to imply that a stated integer or group of integers is desirable but not essential to the working of the invention.
Brief Description of the Drawings
The nature of the invention will be better understood from the following detailed description of several specific embodiments of the system, given by way of example only, with reference to the accompanying drawings, in which:
Figure 1 shows the framework of an embodiment of a system according to the present invention.
Figure 2 shows the procedure of establishing an emergency call according to an embodiment of the present invention.
Figures 3 and 4 show the various stages of the method according to an embodiment of the present invention.
Figure 5 shows an application view according to an embodiment of the present invention.
Figure 6 shows a simplified application view according to an embodiment of the present invention.
Figure 7 shows a flowchart for a SIM card state monitoring module according to an embodiment of the present invention.
Figure 8 shows a flowchart for a Wi-Fi availability detection module according to an embodiment of the present invention.
Figure 9 shows a flowchart for an implicit dialling module according to an embodiment of the present invention.
Figure 10 shows an example of the implicit dialling module according to an embodiment of the present invention.
Figure 11 shows a procedure of remote control triggered by the owner according to another embodiment of the present invention.
Figure 12 shows a procedure of automatic operations without remote input to an embodiment of the present invention.
Figure 13 shows a procedure of remote triggering by reinserting the SIM card according to an embodiment of the present invention.
Figure 14 shows a procedure of locally triggered control operations according to an embodiment of the present invention.
Detailed Description of Preferred Embodiments
The basic idea of the present system and method is to use the emergency channel as the communication channel between the remote mobile device and remote control service provider. The remote control commands are created by assigning specific values for reserved bits in emergency call establishment messages. This does not require an inserted SIM card or any available Internet connection on the mobile device. With our innovation, a user could ask the service provider for activating the remote control service once he/she realized that the registered device is out of his/her physical control. Once the SIM card is removed from a mobile device, the mobile device would make a special emergency call to the service provider requesting remote control service. Only if the mobile device sends a remote control service request to the service provider after the service provider has already received a remote control service request from the user, the service provider will send appropriate remote control commands to the mobile device. An example of such a control command or operation carried out by the mobile device would be for the memory to be erased, and different levels of deletions can also be implemented depending on the conditions the system is triggered. A control command could send instructions to the mobile device to carry out a rapid deletion, although quick this could mean that an adversary may be able to recover the data. A more detailed or secure deletion can also be instructed to the mobile device, such that an adversary would not be able to recover the data.
In accordance with an embodiment of the invention there is provided a system for sending commands remotes to a mobile device. Figure 1 shows a remote control service provider 100, a call control entity 110 that resides in a mobile cellular
network, and a mobile phone 120 used by the owner. The remote control service provider 100 can also perform the functions of the call control entity 110. To remotely control a stolen mobile phone, the owner or user 120 interacts with the remote control service provider 100 as follows:
1. The user 120 subscribes to the remote control service specifying the type of the remote control service as locking the mobile phone, wiping the data on the mobile phone and locating the mobile phone or a combination of these services from the service provider 100 and registers the mobile phone when the phone is physically controlled by the user 120. After a successful registration, the remote control service provider records the lMEI number of the phone in the IMEI database and marks its state as being physically controlled by the user.
2. In the event where the user 122 reports the loss of the phone to the remote control service provider 100 and asks for initiating remote control service for the mobile phone, as soon as he/she realizes that the phone is lost or got stolen. After authenticating the reporter, the service provider 100 checks the state of the reported phone. If the state of the reported phone is recorded as being physically controlled by the user, the service provider changes the state of the reported phone in the IMEI database 105 by tagging it as remote request approved. The remove request approved means that the user approves control operations or local operations to be carried out on the mobile device remotely by the service provider. When the mobile device asks for remote control operations by sending the service provider a remote control request after the SIM card has been removed, the service provider checks the state of the mobile device in the database for user permission. If the state is tagged as remote request approved it means that the user has already reported the loss and approved the remote control. Meanwhile, the service provider asks the call control entity 110 to send a remote control command to the phone through cellular network using the IMSI (International Mobile Subscriber Identity) number (i.e., phone number) that recorded in the IMEI database corresponding to the phone's IMEI number to identify the
phone. If the state of the phone is tagged as SIM card re-inserted, the service provider asks the call control entity to send a remote control command to the phone using the IMSI number recorded in IMEI database 105 corresponding to the phone's IMEI number to identify the phone. If the state of the phone is tagged as remote control service requested, the service provider changes the state of the phone as remote request approved. Upon receiving a remote control command using the IMSI number as the phone identity, the phone will immediately perform related operations according to the operation instruction contained in the received command.
The International Mobile Subscriber Identity (IMSI) is an internationally standardized unique number to identify a mobile subscriber. The IMSI consists of a Mobile Country Code (MCC), a Mobile Network Code (MNC) and a Mobile Station Identification Number (MSIN). IMEI {International Mobile Equipment Identity) is a unique 15-digit number assigned to all cellular devices.
To remotely control a stolen mobile phone without the available SIM (Subscriber Identification Module) and the Internet connection, a user 120 needs to subscribe to the remote control services before the phone gets lost. This can be done with the remote service provider through a registration process. The owner registers the service with identification information (e.g., ID card information) that can uniquely identify himself to the service provider and specify the type of remote control service according to the service category provided by the remote control service provider and personal requirements. The identity information can be submitted online or through any other specified way. The service provider records the IMEI number of the registered mobile phone and marks its state corresponding to the IMEI number as being physically controlled by the user in the IMEI database.
Figures 3 and 4 show an example of using the system to remotely wipe out a mobile phone, in particular the smartphone, mobile phone or mobile device registration and report of loss. In Figure 3, the mobile device owner 320 first registers with the Registration service of the Wipe-out service provider 300 and a customized application is installed, having been downloaded or preinstalled by the telecommunications provider. The device state would then be tagged in the IMEI
database 305 as normal, i.e. the legal owner/user is in control of the mobile device, and the owner uses the mobile device as usual. In the event of loss of the mobile device, the owner 322 reports the loss to the Wipe-out Service Provider 300, via an answering service which authenticates the identity of the owner reporting the loss. The IMEI database 305 is then checked and the status or the state of the mobile device is updated and tagged accordingly. Figure 4 then shows what happens next as the application residing on the mobile device 430 makes a customized emergency call, even though the person who picked up the phone removes the SIM card or switches off the Wi-Fi. The customized emergency call is attached with a deletion indicator where customized values are assigned for the reserved bits, and the call control entity 400 receives this and checks with the IMEI database 405 regarding the state of the device. If the status is tagged as lost or stolen, the IMEI database 405 reports back to the Call Control Entity 400 accordingly, and the Call Control Entity 400 sends a Wipe-out Command to the mobile device, by assigning a specific value for a special data field, in this example the call reject message. If the status is tagged as normal by the IMEI database 405, the Call Control Entity sends a call accepted message to the mobile device 430 and the mobile device 430 hangs up the customized emergency call. This status being tagged as lost or stolen can be made via a request or remote control request sent by the user through making a service call or reporting on the official website. Once the user report the loss and passes the authentication, the service provider will update the state of the reported phone as request approved (which is just a name of one state identified by us) indicating that this phone is reported to be lost or stolen by its legal user.
If an event occurs like the mobile phone being stolen, the owner could request for activating the remote control service for the phone through a service call or web interface, or even the SMS. The specific way to report the theft is dependent on the specification of the service provider and personal preference. The remote service provider or call control entity taking the report from the owner can authenticate the user identity of the owner before recording the report and perform follow-up procedure, in case that the remote control is initiated by malicious people. Prior to the event, the owner of the mobile device would provide identity information (e.g.,
ID card information), or specific answers to a security question that can be used to uniquely identify the owner to the service provider for the authentication process. Furthermore, the service provider may enhance the authentication process by challenging the reporter with certain specific questions, such as providing one phone number with the most frequent communication. If the process is automated, the answers can be presented in a multiple-choice format for the user input via keypad. Once the owner reports the loss and passes the authentication process, the service provider checks the state of the reported phone in the IMEI database. If the state of the phone is still tagged as being physically controlled by the user, the service provider updates the record of the mobile phone in the IMEI database by tagging its state as remote request approved. Meanwhile, the service provider asks the service provider to send a remote control command to the phone through cellular network using the IMSI number (i.e., phone number) that recorded together with the phone's IMEI number in the IMEI database to identify the phone. In this case, this IMSI number is recorded in the IMEI database when the phone is controlled by the user, which means that this IMSI number is the user's phone number used on the registered phone.
In the other case, if the state of the reported phone is tagged as SIM card reinserted, which means that a SIM card is inserted to the phone after the original SIM card was removed from the phone, the re-inserted SIM card could be either the original SIM card or a new SIM card. The IMSI number recorded in the IMEI database is updated as the current in use IMSI number, once the service provider updates the state of the phone as SIM card re-inserted. Therefore, the IMSI number used in the remote control command which is send by the service provider could be either the user's original IMS! number or a new IMSI number.
Once the subscriber identification module is detected to be absent on the mobile phone which may imply that the phone is stolen, the mobile phone starts to make an emergency call with a remote control request indicator attached implicitly and automatically, asking for remote control command. This emergency call will be triggered by either of these events: the SIM card is removed from a switched-on smartphone or the smartphone is powered on with the SIM card unplugged. Note
that for the purpose of preventing an adversary from being conscious of the running procedure, all ongoing procedures can be operated implicitly which means that all procedures run in the background, for example, the screen does not light up or provide any visual cues or information that the application is running in the background.
Either the remote service provider or call control entity of the network, depending on the requirements, decides the next steps based on the received signals. Once the call control entity receives an emergency call with a remote control request indicator attached from a mobile phone, it will check the state of this phone in the IMEI database of the service provider using the following procedure:
1. The mobile phone attaches a remote control request indicator to an emergency call, and makes this emergency call attempt on the mobile cellular network. The IMEI is used as the equipment identification.
2. The call control entity checks the state of the mobile phone in the IMEI database of the service provider, after receiving the request for setting up a customized emergency call with a remote control request indicator attached.
3. If the smartphone is tagged as remote request approved in the IMEI database, the call control entity sends the remote control command to the mobile phone corresponding to the remote request approved by the phone. Otherwise, if the state of the phone is recorded as being physically controlled by the user, the call control entity responds with a remote control request reject message and informs the service provider to update the state of the phone in the IMEI database as remote control service requested.
After receiving the remote control command, the smartphone performs the operations as instructed in the remote control command. If the smartphone receives the call accepted message (case 3), it ends the ongoing emergency call.
Once the mobile phone detects the absence of the SIM card, it asks for remote control service through making an emergency call with a remote control request indicator attached. The remote control request indicator is attached by using
reserved bits in certain data fields to assign specific values, which keeps the signal procedure of the emergency call for requesting remote control service consistent with the normal emergency call originated by a phone as defined in standard protocols. Therefore, the network carriers could support the disclosed method of remotely controlling a mobile phone without any change of current network structure, since the remote control request indicator is attached based on minimal modification of the implementation of current protocols.
When the call control entity receives an emergency call establishment message with a remote control indicator attached, it checks if the phone is indeed stolen trough querying the IMEI number and its state in the IMEI database of the service provider. After confirming the state of the phone by checking the IMEI number in the IMEI database of the service provider, the call control entity decides what operation instruction should be send to the mobile device as a response to its remote control request.
If the mobile device is tagged as remote request approved in the IMEI database, the call control entity sends a remote control command to the phone. The remote control command is formatted through assigning a specific value for a special data field of the call reject message defined in the current call control protocol. Upon receiving the remote control command, the mobile phone starts to perform local operations according to the operation instructions given in the remote control command.
Otherwise, if the state of the phone is being physically controlled by the user, the call control entity will send a remote control request rejected message to the mobile phone rejecting its remote control request. Meanwhile, the call control entity will inform the service provider to update the state of the phone as remote control service requested.
In an embodiment, the call accepted message consistent with the access permission for a legal emergency call originated by a phone without the SIM card can be used as the remote control request reject message, in order to keep the consistence with current protocol. In this case, upon receiving a call accept
message as a response to the remote control request, the mobile phone terminates this emergency call releasing all occupied resources after receiving this message.
The mobile phone can be set to make the emergency calls with a remote control request indicator attached to the call control entity only once or periodically by either the user or the remote control service provider.
In an embodiment, the mobile phone makes the emergency call with a remote control request indicator to the call control entity only once, which consumes little power. In this case, if the mobile phone cannot receive a remote control command send by the service provider using the I MSI number as phone identity in a time limit after receiving the request deny message as a response to the emergency call establishment message, the phone will perform an authentication process and ask the user to provide a PIN code which is previously set by the user and saved in the phone. If the provided PIN code matches the saved PIN, no further operation will be performed. Otherwise, if the provided PIN code do not match the saved PIN, the remote control application will automatically perform the local control operations as the user subscribed during registration. Such time limit could be set by the user when the phone is physically controlled by the user. In other embodiments, such PIN-based user authentication could be replaced by other user authentication scheme, e.g., fingerprint- based authentication, graphical authentication, voice- based authentication, face authentication.
In other embodiments, to provide higher security, the mobile phone can make the emergency calls asking for remote control command periodically until the reception of the remote control command. In this case, the frequency of making the customized emergency calls is dependent on the consideration on power consumption and security requirement. The higher frequency of making such emergency calls, the higher possibility of performing remote control on the mobile phone before the user data on the phone has been transferred or leaked. However, high frequency results in high power consumption and heavy burden on network as well. Moreover, the user could stop the phone to making such emergency calls through providing the correct PIN code, if the SIM card is removed by the user and
the user does not want the phone to make such emergency call in the backstage. This PIN code could be either the same PIN code that used for prevent the phone from automatically performing control operations or another PIN code set by the user and saved in the phone when the phone is normally controlled by the user. In other embodiments, such PIN-based user authentication could be replaced by other user authentication scheme, e.g., fingerprint-based authentication, graphical authentication, geolocation authentication, voice-based authentication, face authentication etc.
In an embodiment, in case there is a normal emergency call dialled on the screen, the mobile phone stops making the emergency call with a remote control request indicator attached and the ongoing emergency call for requesting remote control service is cancelled instantly.
Figure 11 shows an embodiment of the invention where the remote control is triggered by the owner directly by reporting the loss, authenticating his identity and thereafter sending the remote command, possibly via the cellular network if available, to the mobile phone should the mobile phone be tagged as stolen. The mobile phones were initially tagged as physically controlled by the user or SIM card re-inserted until the user report the loss. After the user reports the loss, the service provider changes the state of the phone to stolen (i.e., request approved). This request refers to the remote control service request sent by the legal user to the service provider where upon receiving such request (i.e., the loss report) from the legal user, the service provider will first check the state of the reported phone in the IMEI database. If the reported phone is tagged as physically controlled by the user or SIM card re-inserted, the service provider will ask the call control entity to send a remote control command to the phone via cellular network using the recorded IMSI to identify the mobile phone. After that, the service provider will change the state of the phone as request approved in its IMEI database. Otherwise, If the phone is tagged as remote control service requested (which means that the call control entity has received a remote control service request from the mobile phone) in the IMEI database when the user reports the loss and asks for activating remote control service, the service provider will just change the state of the phone to
request approved without asking the call control entity to send a remote control command to the phone using IMSI number to identify the mobile phone.
In an embodiment shown in Figure 13, if a SIM card is plugged in after the mobile phone has detected the absence of the SIM card, the mobile phone stops making the emergency call with a remote control request indicator attached and the ongoing emergency call for requesting remote control service terminates instantly. After that, the phone will immediately make an emergency call to the service provider using the IMEI number and/or IMSI number as device identity notifying the service provider that a SIM card is re-inserted in the phone. In order to distinguish such emergency call with the normal emergency call initiated by the user, an indicator of SIM card re-inserting may be attached in the emergency call establishment message through assigning a special value for some reserved bits. Once the call entity receives an emergency call establishment request with a SIM card reinserting indication attached, it will notify the service provider to update the state of the phone as SIM card re-inserted and update the IMSI number of the phone as the IMSI number received in the call establishment message. Once the service provider updates the state of the phone as SIM card re-inserted, the service provider will contact the user to confirm the state of the phone using the contact methods provided by the user at registration, such as emergency contact number and emails. If the user confirms that the phone is lost, the service provider will ask the call control entity to send a remote control command to the phone using the updated IMSI number to identify the phone. Otherwise, if the user confirms that the phone is not lost, the service provider will change the state of the phone as physically controlled by the user in its IMEI database. In the other case, if the service provider cannot get in touch with the user, the state of the phone will remains as SIM card re-inserted in the IMEI database until either the user initiatively contact with the user or the service provider finally get in touch with the user through several contact attempts. The user can also specify the frequency and the number of contact attempts initiated by the service provider during registration.
Although this invention supports remote control of a mobile phone through emergency channel even if the Wi-Fi connection is not available and the SIM card
is unplugged, all network communication channel including emergency channel between the phone and the outside may be blocked in some situations, i.e., placing the phone in an electromagnetically shielded environment or configuring the phone to flight mode, as shown in Figure 12. In case that, if the phone loses all network communication channel with the outside for a time limit which is previously set by the legal user, the phone will request for authentication of the user. If the user passes the authentication and provides legal credentials, no further operations is performed on the phone. However, if the user fails in the authentication, by providing illegal credentials, the control operations which subscribed by the user in the registration will be automatically performed on the phone, which includes data wiping, screen locking, geolocation tracking, mobile device locking, or a hard reset of the mobile device or other operations that render the mobile device inoperative.
In one embodiment shown in Figure 14, the mobile device, like a phone, can perform an authentication process locally on the mobile device and ask the user to provide a PIN code after losing all network communication channels with the outside. This can occur when the mobile device is located into an electromagnetically shielded environment or the mobile device being in the flight mode. If the provided PIN code matches the saved code that set previously by the legal user, and legai credentials are provided by the user, no further operations will be performed on the phone. However, if the provided PIN code does not match the saved PIN code, and illegal credentials are provided, the control operations which subscribed by the user in the registration will be automatically performed on the phone. In other embodiments, the phone can authenticate the user with other user authentication scheme, e.g., fingerprint-based authentication, graphical authentication, geolocation authentication, voice-based authentication, face authentication.
An example of remotely controlling a mobile phone on the emergency call channel through making an emergency call in UMTS network is shown in Figure 2. While one embodiment in UMTS (Universal Mobile Telecommunications System) network has been provided in the present disclosure, it should be understood that the disclosed systems and methods may be embodied in many other network built
under different mobile cellular system standard without departing from the spirit or scope of the present disclosure.
The procedure of establishing an emergency call in UMTS network is shown in Figure 2, and the bordered words indicate the modifications for providing remote control service. In UMTS network, the MS (Mobile Station) 210 is equivalent to the mobile phone and the call control entity is the MSC (Mobile Switching Center) 220. A remote control request indicator is attached to the "emergency setup" message by assigning a specific emergency service category value, indicating the type of requested remote control service. As stipulated in UMTS specification, each bit of the emergency service category value stands for one emergency case. Specially, bit 8 is reserved and set to 0. Mobile station may set one or more bits to 1 to specify an emergency service category. To indicate a remote control service distinguishing from any other emergency service, the reserved bit of emergency service category value is set to 1 indicating that this emergency call is made to asking for remote control commands. With the bit 8 set to 1 , other bits can be set to specific values indicating different operation request, e.g., data erasure, lock and location. For example, the reserved bit of emergency service category value is set to 1 and this value is specified as "10000000" indicating emergency service for data erasure. For a normal emergency call attempt, the call control entity sends a "release" message to the mobile phone 210 with a specific value of the cause information element indicting the cause of rejecting this call. The cause information element in the "release" message is used to indicate the reason for the abortion. Several causes are customized as remote control commands through assigning specific values for the cause information element which are different from all abortion causes defined in UMTS specification. Upon receipt of a "emergency setup" message with remote control request indicator attached, the call control entity checks the responded IMEl and its state in the database of the service provider. If the state of the mobile phone is stolen, the call control entity sends a "release" message to the phone with the special cause corresponding to the remote control service requested in the "emergency setup" message instructing the mobile device to perform related operation. For example, "01100111" which is distinguished from
all existing cause values defined in UMTS specification could be assigned for the cause information element to define a specific cause "data erasure". When the call control entity receives a data erasure indicator in an "emergency setup" message from a mobile device and the state of said mobile devices is verified as stolen, the call control entity sends a "release" message with the cause filed assigned as "01100111" indicating the mobile device 210 to perform data erasure operations.
In an embodiment shown in Figure 5, to support remote control service or wipe-out service provider 300, the mobile device 510 can have four units: a SIM card state monitoring unit 515, a Wi-fi availability detection unit 520, an implicit dialling unit 525 and a local operation unit 530. The location operation unit 530 would carry out local operations, for example secure wipe-out operations or erasing of data, when the appropriate command is provided by the wipe-out service provider 300. All of these units could run implicitly in the backstage to keep the person who is physically controlling the mobile device unrealized about the ongoing procedures for providing remote control service. These units can also run as normal applications in other embodiments.
In one embodiment shown in Figure 6, to support remote control service, the mobile device 510can have three units: a SIM card state monitoring unit 515, an implicit dialling unit 525 and a local operation unit 530. All of these units could run implicitly in the backstage to keep the person who is physically controlling the mobile device unrealized about the ongoing procedures for providing remote control service. These units can also run as normal applications in other embodiments.
A SIM card state monitoring module shown in Figure 7 monitors the SIM card state. When the SIM card state changes, it will further detect the SIM card state. If the SIM card is determined to be absent, it will send a signal to emergency dialling unit indicating that the SIM card is absent. In another hand, this unit detects the SIM card state when the system boots up after the smartphone is powered or switched on. If the SIM card is absent, if a wi-fi availability module is present, it can send a signal using the wi-fi, otherwise a signal is sent to the emergency dialling unit or implicit dialling module indicating that the SIM card is absent. Moreover, this module
keeps monitoring the state change of the SIM card, and if SIM card is re-plugged, the mobile device stops making customized emergency calls and an ongoing customized emergency call terminates.
An emergency dialling unit or implicit dialling module shown in Figure 9 makes customized emergency calls by attaching an emergency service request indicator on an emergency call establishment message when the SIM card is unplugged. All call reminder procedures are skipped, and a deletion flag is attached to the emergency call. It will also analyse the responses from the remote control service provider to decide if a signal should be send to the local operation unit to activate related operation, for example to send a wipe-out command to secure wipe-out module, which is described elsewhere. An example running on Android operating system of the implicit dialling module is shown in Figure 10.
A local operation unit starts to perform specific operations, i.e., locating, locking, data erasure, on the smartphone when the phone receives a remote control command from the service provider. Once the local operation procedure is activated, this procedure cannot be interrupted for the purpose of ensuring a completed operation, except for power off or being out of battery. Even in this case, an unfinished operation procedure will automatically resume at the next boot until whole procedure for the specific operation is completed.
In other embodiment shown in Figure 5, besides said three units, the mobile device could also have a Wi-Fi availability detection unit shown in Figure 8. A Wi-Fi availability detection unit detects the availability of Wi-Fi connection after the SIM card is detected to be absent by the SIM card state monitoring unit. In this case, if the SIM card is absent, the SIM card state monitoring unit will send a signal to Wi- Fi availability unit indicating that the SIM card is absent. After receiving this signal, Wi-Fi availability detection unit detects the availability of Wi-Fi connection. If no Wi- Fi connection is present, this unit sends a signal to the emergency dialling unit or implicit dialling module to activate a customized emergency call. Moreover, this unit keeps monitoring the state of internet connection and an internet connection is built
up, the smartphone stops making customized emergency calls and an ongoing customized emergency call terminates.
This invention provides a system and method for remotely controlling mobile devices without SIM card and Internet connection. The basic idea is to use the emergency channel as the communication channel between the remote mobile device and remote control service provider. The user of the remote control service needs to register the mobile devices for such service when the mobile device is normally used by him/her. The user also needs to report the loss to the service provider once he/she realized that the registered device is lost asking for activating remote control service. Once the SIM card is removed from a registered mobile device, the mobile device starts to make a customized emergency call attaching a remote control service request indicator in the emergency call establishment message. Such remote control service request indicator is attached by assigning specific values for reserved bits in the emergency call establishment massage. After receiving the remote control service request from the mobile devices, if the user has already asked for activating the remote control service, the remote service provider sends back remote service command by attaching such command to the response messages of the emergency call establishment massage. The remote service command is attached through assigning specific values for reserved bits in such response messages. Otherwise if the user has not activated the remote control service yet, the requested remote service will be denied.
It will be readily apparent to persons skilled in the relevant arts that various modifications and improvements may be made to the foregoing embodiments, in addition to those already described, without departing from the basic inventive concepts of the present invention. For example, the mobile devices can be replaced with any computing device capable of communicating over a cellular network. Also the SIM card can be replaced by Removable User Identity Module (R-UIM) card, CDMA Subscriber Identify Module (CSIM), Universal Subscriber Identity Module (USIM), Universal Integrated Circuit Card (UICC) or similar cards. Therefore, it will be appreciated that the scope of the invention is not limited to the specific embodiments described.
Claims
1. A system for remotely controlling a mobile phone comprising a mobile phone, a call control entity and a remote control service provider, wherein:
the remote control service provider is used to record information of a user and the mobile phone, receive a remote control service request from the user, record the remote control service request and associate the remote control service request with the mobile phone;
the mobile phone is used to monitor the state of a subscriber identification module within the mobile phone, the subscriber identification module securely stores an international mobile subscriber identity (IMSI) number and a related key, the mobile phone is used to generate a remote control request indicator when the subscriber identification module is removed from a switched-on mobile phone or the mobile phone is powered on without an available subscriber identification module, the mobile phone making an emergency call to the call control entity with a generated remote control request indicator attached in an emergency call establishment message as a remote control request, the mobile phone receiving a remote control command from the call control entity and the mobile phone performing a local operation according to an instruction contained in the remote control command received;
the call control entity is used to receive the remote control request indicator through receiving the emergency call establishment message from the mobile phone, the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider, and the call control entity sending the remote control command to the mobile phone.
2. The system of claim 1 , wherein the remote control service provider is also used to carry out a registration of the user and the mobile phone, wherein the registration of the user with the remote control service is carried out using identification information (e.g., ID card information) that can uniquely identify the user to the remote control service provider when the user is in physically control of the mobile phone and the user specifies the type of remote control service to be
activated, wherein the type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone.
3. The system of claim 1 , wherein the remote control service provider is also used to carry out an authentication on the user for a request initiating remote control to a mobile phone and record the received remote control service request only after the authentication is successful.
4. The system of claim 1 , wherein the remote control service provider is also used to receive a message that contains the subscriber identification module reinserted indication and the currently used IMSI number from the mobile phone, the remote control service provider is used to record the received IMSI number associated with the International Mobile Equipment Identity (IMEI) number of the mobile phone in the IMEI database, and confirm a state of the mobile phone with the user and send the remote control command to the mobile phone.
5. The system of claim 2 wherein the remote control service provider maintains an IMEI database that used to record the IMEI number, the state of the mobile phone and the IMSI number of the mobile phone, wherein
the IMEI number of the mobile phone is recorded in the IMEI database and the state of the mobile phone is recorded as being physically controlled by the user associated with its IMEI number when the user completes the registration of the remote control service;
the state of the mobile phone associated with the IMEI number is recorded as remote request approved to record the remote control service request after the remote service provider receives a remote control service request from the user and successfully authenticates the user;
the state of the mobile phone is recorded as SIM card re-inserted after the remote service provider receives a message that contains the subscriber identification module re-inserted indication and the current in use IMSI number from the mobile phone; and
the state of the mobile phone is recorded as remote control service requested after the service provider receives a remote control request from the mobile phone;
wherein the IMS! number of the mobile phone is recorded as the I SI number used on the mobile phone when the user finishes the registration; and
the IMSI number of the mobile phone is updated as the received IMS! number after the service provider receives a message that contains the subscriber identification module re-inserted indication and the current in use IMSI number from the mobile phone.
6. The system according to any one of claims 1 -5, wherein the call control entity determines the user permission for the received remote control request that is sent by the mobile phone from the remote control service provider through checking the state of the mobile phone in the IMEl database of the service provider, then the call control entity sends the remote control command to the mobile phone when the state of the mobile phone is recorded as remote request approved in the IMEl database;
or the call control entity sends a remote control service rejection message to the mobile phone to rejecting its remote control service request when the state of the mobile phone is recorded as being physically controlled by the user in the IMEl database..
7. The system of claim 1 , wherein the generated remote control request indicator is attached in the emergency call establishment message by assigning specific values for reserved bits in certain data fields in the emergency call establishment message.
8. The system of claim 1 or 6, wherein the remote control command is formatted through assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol.
9. The system of claim 1 , wherein the mobile phone makes the emergency call with a remote control request indicator attached to the call control entity either only one time or several times until receiving the remote control command from the call control entity, wherein the frequency of making the said emergency call is set by either the user or the remote control service provider; if the mobile phone cannot receive a remote control command from the remote service provider in a time limit after making the emergency call with a remote control request indicator attached, the mobile phone requests for authentication from the user; if the user fails in the authentication, the mobile phone performs control operations automatically.
10. The system of claim 1 , wherein the mobile phone makes an emergency call to the call control entity with the a remote control request indicator attached implicitly without any operation information displayed on the screen, and all call reminder functions are skipped when making the said emergency call.
11. The system of any one of claims 1 , 4, or 5, wherein the remote control service provider checks the state of the mobile phone in the IMEI database before updates the state of the phone as remote control service approved when receives a lost report from the user:
if the state of the mobile phone is recoded as physically controlled by the user or SIM card re-inserted, the remote service provider uses the mobile phone's IMSl number recorded in the IMEI database to identify the phone and sends a remote control command to the phone through cellular network.
12. The system of claim 1 , the mobile phone activates user authentication after losing all network communication channels within a time period.
13. The system of claim 12, wherein the time period is defined by the user of the mobile phone.
14. The system of claim 12, wherein if the user fails in the user authentication, the mobile phone performs control operations automatically.
15. The system of any one of claims 3, 9, 12, and 14, wherein the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice- based authentication, and face authentication.
16. A method for remotely controlling a mobile phone, wherein the method is applied to a system comprising one or more mobile phones, a call control entity and a remote control service provider and comprises performing locking the mobile phone, wiping the data on the mobile phone and locating the mobile phone or a combination of these services, the method comprises the following steps:
the remote control service provider receiving a remote control service request from a user and record the remote control service request and associate the remote control service request with the mobile phone;
the mobile phone making an emergency call to the call control entity with a remote control request indicator attached in the emergency call as a remote control request;
the call control entity sending an enquiry for user permission for the received remote control request from the remote control service provider after receiving an emergency call with a remote control request indicator attached from the mobile phone;
the call control sending a remote control command to the mobile phone if the remote control service request for the mobile phone sending by the user is recorded by the remote control service provider; and
the mobile phone performing a local operation according to an instruction contained in the received remote control command.
17. A method of claim 16, further comprising the step of: registering the user a remote control service from the remote control service provider, the user providing identification information (e.g., ID card information) that can uniquely identify himself to the remote control service provider when the user can physically control the mobile phone and specifying the type of remote control service, wherein the
type of remote control service is any one or a combination of locking the mobile phone; wiping the data on the mobile phone; and locating the mobile phone.
18. A method of claim 16, further comprising the step of: the remote control service provider an authentication of a user who asks for initiating remote control to a mobile phone and recording the received remote control service request only after the authentication is successful.
19. A method of claim 16, further comprising the step of: the remote control service provider receiving a message that contains the subscriber identification module re-inserted indication and the currently used IMSI number from the mobile phone, the remote control service provider recording the received IMSI number associated with the IMEI number of the mobile phone in the IMEI database, the remote control service provider confirming the state of the mobile phone with the user registered and sending remote control command to the mobile phone.
20. A method of any one of claims 16-19, further comprising the step of: the remote control service provider recording the IMEI number of the mobile phone and the state of the mobile phone associated with its IMEI number as being physically controlled by the user in a IMEI database when the user finishes the registration, and the remote control service provider recording the state of the mobile phone associated with the IMEI number as remote request approved after receiving a remote control service request from the user and successfully authenticating the user, and the remote control service provider recording the state of the mobile phone as SIM card re-inserted after receiving a message that contains the subscriber identification module re-inserted indication and the currently used IMSI number from the mobile phone, and recording the state of the mobile phone as remote control service requested after receiving a remote control request from the mobile phone,
wherein the remote service provider records the IMSI number of the mobile phone as IMSI number used on the mobile phone when the user finishes the registration, and recording the IMSI number of the mobile phone as the received IMSI number
after receiving a message that contains the subscriber identification module reinserted indication and the current used IMSI number from the mobile phone.
21. A method of claim 16, further comprising the step of: the call control entity sending an enquiry for user permission for the received remote control request through checking the state of the mobile phone which it received the remote control request from, wherein,
the call control entity sending the remote control command to the mobile phone, when the state of the mobile phone is recorded as remote request approved in the IMEI database; or
the call control entity rejecting the remote control service request received from the mobile phone through sending a remote control service rejection message to the mobile phone when the state of the mobile phone is recorded as being physically controlled by the user in the IMEI database.
22. A method of claim 16, further comprising the step of: the mobile phone assigning specific values for reserved bits in certain data fields in an emergency call establishment message indicating remote control service request when making the emergency call to the call control entity.
23. A method according to any one of claims 16-22, further comprising the step of: the call control entity assigning a specific value for a special data field of the emergency call reject message defined in the current call control protocol formatting the remote control command.
24. A method of claim 16, further comprising the step of: the mobile phone making the emergency call with a remote control request indicator attached to the call control entity according to a frequency set by either the user or the remote control service provider.
25. A method of claim 24, wherein the mobile phone performs an authentication for the user when the mobile phone cannot receive a remote control command from
the remote service provider in a time period after making the emergency call with a remote control request indicator attached; and when the user fails in the authentication, the mobile phone performs a local operation automatically.
26. A method of claim 25, wherein the time period is defined by the user of the mobile phone.
27. A method of claim 16, further comprising the step of: the mobile phone making the said emergency call implicitly, wherein no operation information is displayed on the screen and all call reminder functions are skipped.
28. A method of any of claims 19-21 , further comprising the step of: the remote control service provider checking the state of the mobile phone in the IMEI database before updating the state of the phone as remote control service approved when receiving a lost report from the user; and
the remote service provider using the mobile phone's IMSI number recorded in the IMEI database to identify the phone and sending a remote control command to the phone through cellular network when the state of the mobile phone is recoded as physically controlled by the user or SIM card re-inserted.
29. A method of claim 16, further comprising the step of: the mobile phone activating an authentication of the user after losing all network communication channels with the outside for a time period; if the user fails in the user authentication, the mobile phone performing local operation automatically.
30. A method of claim 29, wherein the time period is defined by the user of the mobile phone.
31. A method of any one of claims 18, 20, 25, or 29 wherein the authentication is carried out by the mobile phone using at least one of the following: password authentication, fingerprint-based authentication, graphical authentication, voice- based authentication, and face authentication.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201600541XA SG10201600541XA (en) | 2016-01-22 | 2016-01-22 | A system and method for remotely controlling a mobile device |
SG10201600541X | 2016-01-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017127019A1 true WO2017127019A1 (en) | 2017-07-27 |
Family
ID=59362791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2016/050541 WO2017127019A1 (en) | 2016-01-22 | 2016-11-04 | A system and method for remotely controlling a mobile device |
Country Status (2)
Country | Link |
---|---|
SG (1) | SG10201600541XA (en) |
WO (1) | WO2017127019A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113691968A (en) * | 2021-07-14 | 2021-11-23 | 北京市科瑞讯科技发展股份有限公司 | A small microwave communication remote group control system for emergency communication |
US11878549B1 (en) * | 2018-09-17 | 2024-01-23 | John Sooklaris | Substrate for painting, particularly alcohol ink painting |
US20240028693A1 (en) * | 2019-01-16 | 2024-01-25 | Assurant, Inc. | Apparatus, method, and computer program product for claim management device lockout |
CN113316136B (en) * | 2021-05-31 | 2024-02-13 | 北京思特奇信息技术股份有限公司 | Method and system for realizing small white card activation based on intra-provincial system |
US20250005211A1 (en) * | 2023-06-30 | 2025-01-02 | Verizon Patent And Licensing Inc. | Systems and methods for network-initiated modification of access for lost or stolen devices |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040204021A1 (en) * | 2002-04-02 | 2004-10-14 | Keith Cocita | Cell phone feature |
US20060276175A1 (en) * | 2004-12-03 | 2006-12-07 | Samsung Electronics Co., Ltd. | Method of tracking stolen mobile device connected to wireless or wired network |
US20080090548A1 (en) * | 2006-09-14 | 2008-04-17 | Samsung Electronics Co., Ltd. | Method for tracking mobile communication terminal |
US20120052832A1 (en) * | 2009-01-27 | 2012-03-01 | Peter Bleckert | Emergency Call Handling |
US20140038556A1 (en) * | 2012-08-06 | 2014-02-06 | David Reis De Sousa | Mobility Device Security |
CN104507075A (en) * | 2014-12-31 | 2015-04-08 | 徐雅星 | Data protection method for loss of mobile terminal |
-
2016
- 2016-01-22 SG SG10201600541XA patent/SG10201600541XA/en unknown
- 2016-11-04 WO PCT/SG2016/050541 patent/WO2017127019A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040204021A1 (en) * | 2002-04-02 | 2004-10-14 | Keith Cocita | Cell phone feature |
US20060276175A1 (en) * | 2004-12-03 | 2006-12-07 | Samsung Electronics Co., Ltd. | Method of tracking stolen mobile device connected to wireless or wired network |
US20080090548A1 (en) * | 2006-09-14 | 2008-04-17 | Samsung Electronics Co., Ltd. | Method for tracking mobile communication terminal |
US20120052832A1 (en) * | 2009-01-27 | 2012-03-01 | Peter Bleckert | Emergency Call Handling |
US20140038556A1 (en) * | 2012-08-06 | 2014-02-06 | David Reis De Sousa | Mobility Device Security |
CN104507075A (en) * | 2014-12-31 | 2015-04-08 | 徐雅星 | Data protection method for loss of mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11878549B1 (en) * | 2018-09-17 | 2024-01-23 | John Sooklaris | Substrate for painting, particularly alcohol ink painting |
US20240028693A1 (en) * | 2019-01-16 | 2024-01-25 | Assurant, Inc. | Apparatus, method, and computer program product for claim management device lockout |
US12216808B2 (en) * | 2019-01-16 | 2025-02-04 | Assurant, Inc. | Apparatus, method, and computer program product for claim management device lockout |
CN113316136B (en) * | 2021-05-31 | 2024-02-13 | 北京思特奇信息技术股份有限公司 | Method and system for realizing small white card activation based on intra-provincial system |
CN113691968A (en) * | 2021-07-14 | 2021-11-23 | 北京市科瑞讯科技发展股份有限公司 | A small microwave communication remote group control system for emergency communication |
US20250005211A1 (en) * | 2023-06-30 | 2025-01-02 | Verizon Patent And Licensing Inc. | Systems and methods for network-initiated modification of access for lost or stolen devices |
Also Published As
Publication number | Publication date |
---|---|
SG10201600541XA (en) | 2017-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3125593B1 (en) | System and method for automatic detection and activation of a virtual sim on a mobile device | |
US8326268B2 (en) | Method and system for protection against the unauthorized use of a terminal | |
US8818369B2 (en) | Method for a secure detach procedure in a radio telecommunications network | |
EP1601216B1 (en) | Mobile communication terminal | |
AU715486B2 (en) | Checking the identification number of a mobile subscriber | |
EP0993747B1 (en) | Subscriber system with user station with removable data store | |
US20080090548A1 (en) | Method for tracking mobile communication terminal | |
KR100664110B1 (en) | How to Set Restrictions on Mobile Terminals | |
WO2017127019A1 (en) | A system and method for remotely controlling a mobile device | |
US8639290B2 (en) | UICC control over devices used to obtain service | |
KR100623340B1 (en) | Method and apparatus for managing authentication and password user information in digital user terminal | |
KR101059794B1 (en) | Method for restricting illegal use of terminal and system for same | |
CN113785607A (en) | Remote Security Unlock | |
WO2011009496A1 (en) | Terminal identifiers in a communications network | |
KR100631689B1 (en) | Theft prevention method and system of mobile communication terminal | |
US8583081B2 (en) | Method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element | |
US20230276221A1 (en) | Method of Managing a Communication Function in a User Equipment | |
WO2005104571A1 (en) | Method of providing keeping-secret function in given area | |
JP2019149758A (en) | Communication device, management server, security system, control method, and program | |
US20120278857A1 (en) | Method for unlocking a secure device | |
CN100415032C (en) | Interaction method between mobile terminal and network side in mobile communication system | |
EP3185600B1 (en) | Mobile terminal control method and mobile terminal | |
KR20120071703A (en) | Call connection control method for signalling load balancing, mobile terminal and authentication center thereof | |
KR101236487B1 (en) | System and Method for Preventing use of Illegal Mobile Terminal | |
CN100536392C (en) | Location renewing method for mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16886680 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16886680 Country of ref document: EP Kind code of ref document: A1 |