+

WO2009060375A2 - A fail safe tracking system for electronic devices capable of communicating with cellular towers - Google Patents

A fail safe tracking system for electronic devices capable of communicating with cellular towers Download PDF

Info

Publication number
WO2009060375A2
WO2009060375A2 PCT/IB2008/054572 IB2008054572W WO2009060375A2 WO 2009060375 A2 WO2009060375 A2 WO 2009060375A2 IB 2008054572 W IB2008054572 W IB 2008054572W WO 2009060375 A2 WO2009060375 A2 WO 2009060375A2
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
signal
circuit
transceiver
tower
Prior art date
Application number
PCT/IB2008/054572
Other languages
French (fr)
Other versions
WO2009060375A3 (en
Inventor
Aasis Vinayak P. G.
Original Assignee
Vinayak P G Aasis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vinayak P G Aasis filed Critical Vinayak P G Aasis
Publication of WO2009060375A2 publication Critical patent/WO2009060375A2/en
Publication of WO2009060375A3 publication Critical patent/WO2009060375A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/75Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders, or using passive reflectors
    • G01S13/751Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders, or using passive reflectors wherein the responder or reflector radiates a coded signal
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/14Determining absolute distances from a plurality of spaced points of known location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • a fail safe tracking system for electronic devices capable of communicating with cellular towers capable of communicating with cellular towers.
  • This invention relates to a system and method for successful tracking of cellular communication enabled electronic devices irrespective of in a switched off state or even the power source (battery) has been removed
  • CEIR Central Equipment Identity Register
  • the mobile tracker which has been basically implemented by the cell phone manufacturers in their respective cellular devices using the existing state of the art cellular tower infrastructure.
  • the usual mobile tracker is simple. When a cellular phone is bought, the buyer sets two numbers in the mobile tracker application, then sets a password before using the cellular phone. If, perchance, the cellular phone is stolen and the SIM is removed, the mobile tracker comes in very handy. When a new SIM card is entered, the phone sends a message to the two numbers giving the phone number of the new phone. The stolen cell phone can then be tracked down to the new user using this information sent to the new numbers.
  • This advanced mobile tracker essentially gives the owner control over the phone once a new SIM card is entered.
  • the original user can switch off the phone, divert incoming calls and messages to a chosen number, lock the phone, format the phonebook and the to-do list to prevent data theft by sending messages to the phone.
  • a standard mobile tracker will send a message to a predefined number, giving the phone number of the new SIM card. This phone does this but also enables Long Distance Control, granting the original owner a lot of control over the stolen cellular phone even if another SIM card is inserted.
  • the main tasks include, switching off the cellphone (just once per message), diverting incoming calls to another cellphone whose number is added to the message, cancelling call diverting facility, sending all messages in the inbox and diverting all incoming messages to another number, canceling message divert, locking the phone and setting a password to unlock it, formatting the phone memory, deleting all contacts list, messages and other private data like to do lists and calendar entries.
  • the main drawback is that the number sending function is visible to the current user when it ought to have been done in the background, hiding the fact from the current user that it is sending a message to the true owner. Not only does this technology display a message on the screen that it is sending a message, if delivery reports function is enabled it displays a message saying that the message has been delivered. Further, it saves a copy of the send message in the
  • the United States Patent 7,409,219 describes a system and method for recovering a lost or stolen wireless device uses a power management application adapted to detect a low power level and instruct the client location application to determine the current geographic location but this patent is applicable for GPS services only. It detects and sends the current location before the power of the GPS unit is exhausted but does not address the problem of removal of battery or power switch off.
  • the object of the present invention is to provide a tracking system that can track an electronic device capable of communicating with a cellular tower regardless of whether the device is switched off, or the power source has been removed, or the SIM card removed / changed, the IMEI number tampered with.
  • the present invention obviates the drawbacks of the existing prior art by providing for a system and method to successfully track electronic devices having capability to communicate with cellular towers.
  • the system comprises an in-built CMOS enabled timer and transceiver circuit with power back-up integrated with the electronic device's mother circuit.
  • the timer circuit is kept in a running state set for a stipulated time and is only reset if a predetermined user input is fed into the electronic device within that stipulated time failing which an SOS signal is transmitted by the transceiver circuit to the nearest cell tower.
  • the SOS signal is of a lower frequency compared to the modulated digital identification signal (MDIS) so that it draws minimal power from the CMOS circuit.
  • MDIS modulated digital identification signal
  • the SOS induces the cell tower tracking system to send an activation signal to the electronic device.
  • This AS provides the power required by the power backup circuit for enabling the transceiver circuit to generate a modulated digital identification signal (MDIS) periodically.
  • MDIS modulated digital identification signal
  • the MDIS signal is unmodulated at the cell tower to isolate the digital identification signal strength (DISS) which is fed to a computerized comparator along with DISS from other nearby tower signal transceivers to compare and ascertain the relative location of the electronic device based on the relative intensity comparison of the two inputs.
  • the tracking system is also capable of locating the device if it is being moved from one location to another.
  • the in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non-functional.
  • the said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
  • the instant invention provides for a system and method for tracking an electronic device capable of communicating with cellular tower, said tracking system comprising of a CMOS enabled timer and a transceiver circuit incorporated into the mother circuit of the said electronic device in such a manner that any action to disturb the said circuit will render the said electronic device non-functional and a corresponding tower signal transceiver coupled in frequency to the transceiver circuits on the said electronic device, and a computerized server resident on the said cellular tower comprising means to isolate strength of the digital identity signal (DISS), such that, the said CMOS enabled timer circuit is kept in a running state; a predetermined input PASSKEY is entered by an authorized user within a stipulated time period, for resetting the said timer circuit, failing which, the said signal transceiver circuit on the said electronic device generates an SOS signal to be transmitted over the wireless communication channel to the said tower signal transceiver, whereupon the said tower signal transceiver sends an activation signal back to the transceiver section of
  • the said inbuilt power source is a CMOS circuit which draws the said required backup power from the said activating signal received at the said transceiver circuit on the said electronic device from the said cellular tower's signal transceiver in case the battery of the electronic device is removed or the said device is switched off.
  • the said activation signal is generated in response to the said SOS signal being received at the transceiver section of the said tower.
  • the said transceiver circuit on the said electronic device includes an activation signal receiver to receive said AS from the said TR on the said tower in response to the SOS signal.
  • the transceiver circuit on the said electronic device has a semi- passive signal emitter connected to the activation signal transceiver and the said CMOS enabled timer circuit on the said electronic device.
  • the said semi passive signal emitter generates the said modulated digital identification signal (MDIS) to be transmitted to the signal transceiver section of the said cellular tower.
  • the said transceiver section configured to receive incoming modulated digital identification signal (MDIS) is coupled to a signal demodulator (D) to isolate the digital identity signal and the signal strength (DISS) from the said modulated digital identification signal (MDIS).
  • the PASSKEY is generated b a modified RSA algorithm and its stored in the read only portion of the storage unit attached to the microprocessor.
  • the process of tampering with the IMEI number or the disturbing of the said circuit activates a circuit that is embedded in Cl thereby rendering the electronic device useless, said circuit Cl being the link that connects the tracking circuit (MH) with the mother circuit of the electronic device.
  • the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted.
  • the instant invention also provides for a method for tracking an electronic device capable of communicating with cellular tower, said method comprising the steps of - keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating a SOS signal by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver on the cellular tower sending an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, generating a modulated digital identification signal (MDIS) by microprocessor from the data stored in the read only portion of the storage unit and transmitting of the said MDIS by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower, storing the said MDIS on a temporary storage database, demodulating and isolating the said signal and its strength, comparing the said demodulated and isolated signal and its strength with similar other information retrieved from other tranceivers on the said computer
  • the tracking information on the said electronic device is provided irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered.
  • the said tracked information comprises of co-ordinates of the location of the cellular device to the accuracy of atleast 1 meter, information on the nearest landmarks and a dynamically plotting map of the location of the tracked electronic device.
  • the MDIS is generated by a program code resident on the microprocessor on the said electronic device.
  • the stipulated time is a variable value entered by the authorized user according to his convenience after validating the PASSKEY
  • the Figure 1 is a diagrammatic representation of the system of the present invention.
  • the electronic device MH and the controlling tower are represented as circuits in integrated form.
  • the various labeled components of the integrated circuit are :
  • the present invention is a system and apparatus for tracking of electronic devices capable of communicating with the cellular towers.
  • the novelty aspect of the present specification lies in the fact that the electronic device can be traced to a fairly accurate range. Theoretically, the maximum error associated while calculating the coordinates of a place is 0.25% (theoretically). In practical cases it can go up to 1% because of error due to data loss. When converted to geographic scale, this corresponds to within 1 meter in metropolitan cities in India.
  • CMOS technology refers to Complementary Metal-Oxide Semiconductor technology.
  • the CMOS circuit is used to power the system if the power supply is cut off.
  • This circuit has inbuilt capacitor that will store electrostatic energy when it is connected to a power source. Later it utilizes the energy from the electromagnetic wave (AS signals) sent by the transreceiver located in the nearby tower.
  • the CMOS circuit is quite similar to the conventional circuits used in gadgets.
  • the timer also receives energy from CMOS circuit which keeps it running even when the power is cut off.
  • CMOS circuit which keeps it running even when the power is cut off.
  • PASSKEY can be altered after validation with the correct PASSKEY.
  • a stipulated time value is predefined by the company. The user can change this time value after validating with the given passkey. It can have any value ranging from few minutes to few weeks (or even few months depending on the setting used in the program and the CMOS capability); but the timer will always be running. The program is coded such that the timer cannot be turned off.
  • This bi-directional communication process is used to establish communication with the server. The process will be successfully done if the device is able to receive the AS from tower and revert back to the tower by sending the MDIS. The system can proceed only if the server is able to find a matching subscriber number in its database (ie. only if the device's number is there in the database).
  • the device can also be made to send the MDIS in the first step itself if the CMOS circuit is good enough to provide backup power for all the processes.
  • the Tracking process is quite akin to the conventional triangulation process. It has mainly three stages, namely, (a) the electronic device such as the mobile phone sends signal to nearby base stations, (b) Positioning software performs a triangulation calculation on the information from the base stations and (c) the data is converted into a geographical location.
  • the device also communicates with the nearby towers which may be more than one. Then by using the data sent by different towers, the software in the tower server calculates the position of the device by the process of triangulation. Triangulation is a process of determining the location of a point by measuring angles to it from known points at either end of a fixed baseline. Surveying error can also be minimized using various conventionally used methods.
  • Key-pair Generation The passkey is generated using key generation process in cryptography. Any public-key algorithm can be used for generating this PASSKEY (pseudorandom number generator (PRNG) algorithm can also be used).
  • a modified RSA algorithm is used which will generate a pair of keys randomly.
  • the normal program is altered in such a way that the password entry mechanism is removed and one of the keys acts as passkey for the circuit while the other key will be stored in the main program which is written on a Read-only portion of the storage unit attached to the microprocessor (MP).
  • MP microprocessor
  • This process of storing the second passkey in the read-only portion means that even if a person cracks into the program he can not modify the code to suit his fake passkey.
  • the program will be unlocked to change the timer setting only if the user enters the passkey with in the stipulated time. This key will be given by the company to the user while purchasing the device.
  • the algorithm can be further altered by the company so as to get a passkey of suitable length and combination which an authorized person can remember.
  • Power source PS supplies power to the mobile handset circuit (MH) which includes the CMOS circuit and mother circuit; Timer T controls the stipulated time for asking the passkey and entering the passkey.
  • MH mobile handset circuit
  • Timer T controls the stipulated time for asking the passkey and entering the passkey.
  • Cl or circuit 1 which is the connecting circuit with the mother circuit is an IC circuit that is embedded in the core device. It also contains another inbuilt circuit that will make the mother circuit futile by short-circuiting if the circuit is disturbed.
  • El and E2 are input ports 1 and 2 where the user can feed-in information to the circuit, while Ll and L2 are linking circuits that link the microprocessor to the IC and also handle power management.
  • Microprocessor MP contains the main program, one of the pair of keys generated and the control unit.
  • the figure also shows the main program Pr-I that will ask for the passkey and match with pair-key stored in MP.
  • Pr-I also processes and controls the total working of the tracing mechanism.
  • the program and passkey are stored in a read-only portion which prevents any cracking action
  • Inverter I provides for power manipulation.
  • Semi passive signal emitter SE contains a small active signal emitter which sends the first communication signal to the tower. It is powered by the CMOS circuit that will receive power from the matching electromagnetic signal sent by the tower.
  • the Activating signal transreceiver AST receives the activating signal from the tower to power the CMOS circuit. It can also be used to initiate the whole process, if necessary by slightly modifying the circuit.
  • Modulated Digital Identity Signal or the MDIS is sent by the mother device and contains a piece of information in encrypted format, that corresponds to unique id that is allotted to the device and stored in the database of the server located in the tower
  • TR is the Transreceiver in the tower. Its multiple uses for the purpose of this invention include a. sending the AS signal b. receiving the communication signal from the mother device and c. receiving the DISS info from the mother device
  • D or the demodulator in the tower demodulates and decrypts to get the Digital Identity and Signal Strength (DISS) information and converts the signal strength to an absolute scale based on the stored algorithm, and feeds the information for processing.
  • This also contains a mini-program.
  • the DISS is signal strength that can be converted into absolute scale since its creation and conversion after detection are performed with the help of algorithms stored.
  • the DISS information is obtained with the help of the mini program and stored in a temporary storage database. S1,S2,S3, Sn are similar DISS information from other towers
  • the server, CS is the core network that shares a common database which contains unique digital ids for devices, maps of various areas covered, conversion tool that maps the signal strength info from various towers in absolute scale to coordinates of a place, besides temporary storage databases for storing additional information, Pr-2 , tools for analysis, power and data backup mechanism etc.
  • Pr-2 or the Main Program No.2 controls database, manages DISS information, comparison, mapping, tracking, coordinate determination, finding landmarks in the area for easy location, sending information to user (based on the alternate contact information provided)
  • the OS is the information sent to the user.
  • the CMOS circuit receives power from the tower, after a stipulated time, which is also set into the program in the mother device at the time of manufacturing the device, the device will constantly be sending information to the tower and which in turn will be communicating with the user. Hence the user will receive updated information about the current location of the device after every stipulated time interval.
  • the said electronic device can be traced if it is switched off or, the battery or the power back up has been removed.
  • the circuit of the present specification is divided in two parts and thus installed separately where one half of the present invention is in-built into the mother board of the electronic device and the other corresponding half is installed in the cell towers of the cellular communication infrastructure or service provider's communication infrastructure.
  • the said inbuilt circuit is incorporated in such a manner that if any one tries to tamper with this inbuilt circuit part of the present invention, the entire electronic unit will be affected.
  • the position of the in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non functional, the said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
  • the said in-built circuit in the device circuit comprises of the CMOS enabled timer circuit (T) and a transceiver section (AST).
  • CMOS enabled refers to the backup power source such as a capacitor provided for the functioning of the inbuilt circuit.
  • the timer is always running and can be only reset only if an authorized user resets it with a predetermined input, a PASSKEY, within a predetermined time period.
  • the PASSKEY is set by the authorized user earlier and input into the electronic device by means of the user interface on the device such as a keypad. If no PASSKEY is entered or a wrong PASSKEY is input into the device when due within the stipulated time the timer circuit is not reset.
  • the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted; this method is least preferred as this mode has vulnerabilities. Instead it could be done by designing and embedding a proper circuit using a VLSI technique into the main circuit. The circuit will be made to respond to a signal by a specific service provider by conventional methods. This service is of course on the basis of a mutual understanding arrived at between the electronic device manufacturer and one or more service providers.
  • the timer values can be adjusted in a range from 1 minute to few weeks.
  • This technology can be modified for use as a tracking device for any expensive electronic gadgets.
  • the transceiver section comprises of a semi-passive emitter-cum-receiver (SE) and application means incorporated in the said inbuilt circuit to generate a special signal to be sent over the wireless communication connection to the nearest cell tower transceiver circuit.
  • SE semi-passive emitter-cum-receiver
  • the application means can be described as a kind of sensory mechanism working in tandem with the said timer circuit to sense that the device has been missing or taken away from its authorized user thus triggering the above said command to the transmitter section of the inbuilt circuit on the said electronic device.
  • the application means used can be changed from one electronic device to another thereby making it extremely difficult for the hackers to hack the said application.
  • This special signal mentioned above upon reception at the other half of the invention described herein is a specific transreceiver module installed on the said cell tower's transceiver (TR) section induces the transmitter part of the said specific transceiver module to send an activation signal
  • AS activation receiver
  • the said activation signal (AS) plays a very important and integral part in this scenario as this signal (AS) provides the said backup power to the said backup power source for example the said capacitor as in one embodiment of the present specification for enabling the functioning of the said CMOS enabled circuit.
  • This backup power enables the said semi-passive transmitter to send an identification signal to the nearest and said frequency coupled transceiver section of the said cellular tower.
  • the said identification signal is sent in the form of a (MDIS) modulated digital identification signal along with a specific number (like the IMIE number) in a particular embodiment of the present specification.
  • the said MDIS is sent repeatedly to make sure that if the said electronic device is being moved from one location to another by an unauthorized user in an embodiment of the present specification, it can still be traced continuously by the said cell tower receiving that MDIS.
  • the received MDIS is demodulated using demodulator means and the demodulated signal is further isolated to enable the strength of the said signal in form of Digital Identity Signal Strength (DISS).
  • DISS Digital Identity Signal Strength
  • This DISS is further fed into a computerized comparator network along with similar DISS from other cell towers in the vicinity along with information regarding their tower location etc. where these said inputs are compared with the geographical information to determine the location of the said electronic device to a fairly accurate range.
  • transceivers (TR) in the towers will in turn send the said specific 'number' like the IMIE number corresponding to the device as mentioned above to a database of the device numbers maintained in the said computerized network.
  • the said database contains the details about the electronic device such as the authorized owner, alternate contact numbers etc.
  • the said network further sends the said approximate traced location of the said electronic device to the said authorized owner and the service provider.
  • the invention describes a method for tracking an electronic device capable of communicating with cellular tower.
  • the method comprising the steps of keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating an SOS signal, which is a communicating signal sent by the electronic device (MH) to the tower, by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver (TR).
  • the electronic device sends an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, thereby generating a modulated digital identification signal (MDIS) by microprocessor and transmitted by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower.
  • MDIS modulated digital identification signal
  • the MDIS is generated by a program code resident on the microprocessor on the said electronic device.
  • the MDIS is stored on a temporary storage database.
  • the next step involves the demodulating and isolating of the said signal, comparing the said demodulated and isolated signal with similar other information retrieved from other TRs on the said computerized server to ascertain the location of the said electronic device, and forwarding the information to the authorized user for tracking the said electronic device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Systems and apparatus to enable successful tracking of electronic devices having the capability to communicate with cellular towers are described. The circuit of the present specification is divided in two parts and thus installed separately where one part of the present invention is in¬ built into the mother board of the electronic device and the other corresponding part is installed in the cell towers of the cellular communication infrastructure. In one embodiment the system includes an in-built CMOS enabled timer with power backup and transceiver circuit integrated with the electronic device's mother circuit which transmits a SOS to the nearest cell tower. This SOS signal's activation is dependent on a timer circuit which has been kept in a running state set for a stipulated time and is only reset if a predetermined user input is not fed into the electronic device within that stipulated time. The SOS induces the cell tower tracking system to send an activation signal to the electronic device. This AS provides the power required by the power backup circuit for enabling the transceiver circuit to generate a modulated digital identification signal (MDIS). The MDIS signal is unmodulated at the cell tower to isolate the digital identification signal strength (DISS) which is fed to a computerized comparator along with DISS from other nearby tower signal tranceivers (TR)'s to compare and ascertain the relative location of the electronic device based on the relative intensity comparison of the two inputs. The tracking system is also capable of locating the device if it is being moved from one location to another. The circuit is integrated into the electronic device's mother board in such a manner that trying to tamper will render the complete electronic device non-functional.

Description

TITLE
A fail safe tracking system for electronic devices capable of communicating with cellular towers.
FIELD OF THE INVENTION This invention relates to a system and method for successful tracking of cellular communication enabled electronic devices irrespective of in a switched off state or even the power source (battery) has been removed
BACKGROUND OF THE INVENTION In the last decade cell usage has increased tremendously with every seventh person having a cellular phone handset. In some countries such as India where the cell phone services are very user friendly, the sale of handsets has increased tremendously with people from different sections of societies using it. It is no longer seen as a luxury item but more of a necessity.
The flip side of the proliferation of cell phone usage is the theft of handset. Recent research indicates that mobile phone theft has been increasing while there is a marked decrease in many of the other types of crimes. In a study funded by the Engineering and Physical Sciences Research Council, new research by the Midlands Centre for Criminology and Criminal Justice at Loughborough University, UK, has identified a mobile phone 'Top Ten' hit list. There is a need for the mobile phone industry to increase their anti-theft efforts.
There are a number of efforts made in recent times to track cell phones that are lost or stolen. Many countries have acknowledged the use of the IMEI (International Mobile Equipment Identity) in reducing the effect of mobile phone theft. In the UK, under the Mobile Telephones (Re-programming) Act, changing the IMEI of a phone, or possessing equipment that can change it, is considered an offence under some circumstances. Other countries use different approaches when dealing with phone theft. For example, in Singapore, mobile operators are encouraged to take measures such as the immediate suspension of service and the replacement of SIM cards in case of loss or theft.
When mobile equipment is stolen or lost, the operator or owner will typically contact the Central Equipment Identity Register (CEIR) which blacklists the device in all operator switches so that it will in effect become unusable, making theft of cellular or mobile equipment a useless business. The IMEI number is not supposed to be easy to change, making the CEIR blacklisting effective. However this is not always the case: IMEI may be easy to change with special tools and operators may even flatly ignore the CEIR blacklist. According to a BT-Cellnet spokesman quoted by the BBC, new IMEIs can be programmed into stolen handsets and 10% of IMEIs are not unique. Facilities do not exist to unblock numbers listed in error on all networks. This is possible in the UK, however, where the user who initially blocked the IMEI must quote a password chosen at the time the block was applied.
Another existing technology that has been implemented successfully is the mobile tracker which has been basically implemented by the cell phone manufacturers in their respective cellular devices using the existing state of the art cellular tower infrastructure. The usual mobile tracker is simple. When a cellular phone is bought, the buyer sets two numbers in the mobile tracker application, then sets a password before using the cellular phone. If, perchance, the cellular phone is stolen and the SIM is removed, the mobile tracker comes in very handy. When a new SIM card is entered, the phone sends a message to the two numbers giving the phone number of the new phone. The stolen cell phone can then be tracked down to the new user using this information sent to the new numbers.
Recent vendors have taken this tracking of cellular phones one step ahead. This advanced mobile tracker essentially gives the owner control over the phone once a new SIM card is entered. The original user can switch off the phone, divert incoming calls and messages to a chosen number, lock the phone, format the phonebook and the to-do list to prevent data theft by sending messages to the phone. A standard mobile tracker will send a message to a predefined number, giving the phone number of the new SIM card. This phone does this but also enables Long Distance Control, granting the original owner a lot of control over the stolen cellular phone even if another SIM card is inserted.
Among the many tasks performed by the advanced mobile tracker, the main tasks include, switching off the cellphone (just once per message), diverting incoming calls to another cellphone whose number is added to the message, cancelling call diverting facility, sending all messages in the inbox and diverting all incoming messages to another number, canceling message divert, locking the phone and setting a password to unlock it, formatting the phone memory, deleting all contacts list, messages and other private data like to do lists and calendar entries.
However the main drawback is that the number sending function is visible to the current user when it ought to have been done in the background, hiding the fact from the current user that it is sending a message to the true owner. Not only does this technology display a message on the screen that it is sending a message, if delivery reports function is enabled it displays a message saying that the message has been delivered. Further, it saves a copy of the send message in the
9 sent folder of the messages. This again is a drawback as an unauthorized user is alerted that he is being tracked and can dispose of the cellular device which he has stolen. Hence the whole purpose of the advanced mobile tracker is compromised.
As far as the remote controlling goes, it works but is quite tedious as the manual has to be kept close at hand since remembering the codes for the different actions is not easy and remembering the other parameters is impractical. Another limitation is in terms of the technology for which it can be implemented as the mobile tracker or even the advanced mobile tracker application works only for GSM and not CDMA. The cell phone industry as a whole right now is divided into two technical standards, the GSM (Global System for Mobile) communication standard and the CDMA (Code Division Multiple Access) communication standard.
The United States Patent 7,409,219 describes a system and method for recovering a lost or stolen wireless device uses a power management application adapted to detect a low power level and instruct the client location application to determine the current geographic location but this patent is applicable for GPS services only. It detects and sends the current location before the power of the GPS unit is exhausted but does not address the problem of removal of battery or power switch off.
All the aforementioned methods/devices do not work if the cell phone has been switched off or if the battery has been removed by an unauthorized user thus preventing the advance mobile tracker application to initiate its functionality. Thus, the cell phone device in the hands of an unauthorized person cannot be traced by the service provider or by the owner if the cell phone is switched off. This non-receivability of a signal from a switched-off device then provides the hacker to hack and change the IME number which in turn disables the protection system presently invoke.
Further, conventional method of cell phone protection requires a high degree of cooperation between law enforcement department and the cell phone service provider.
OBJECT OF THE INVENTION
The object of the present invention is to provide a tracking system that can track an electronic device capable of communicating with a cellular tower regardless of whether the device is switched off, or the power source has been removed, or the SIM card removed / changed, the IMEI number tampered with. SUMMARY OF THE INVENTION
The present invention obviates the drawbacks of the existing prior art by providing for a system and method to successfully track electronic devices having capability to communicate with cellular towers. The system comprises an in-built CMOS enabled timer and transceiver circuit with power back-up integrated with the electronic device's mother circuit. The timer circuit is kept in a running state set for a stipulated time and is only reset if a predetermined user input is fed into the electronic device within that stipulated time failing which an SOS signal is transmitted by the transceiver circuit to the nearest cell tower. The SOS signal is of a lower frequency compared to the modulated digital identification signal (MDIS) so that it draws minimal power from the CMOS circuit.
The SOS induces the cell tower tracking system to send an activation signal to the electronic device. This AS provides the power required by the power backup circuit for enabling the transceiver circuit to generate a modulated digital identification signal (MDIS) periodically.
The MDIS signal is unmodulated at the cell tower to isolate the digital identification signal strength (DISS) which is fed to a computerized comparator along with DISS from other nearby tower signal transceivers to compare and ascertain the relative location of the electronic device based on the relative intensity comparison of the two inputs. The tracking system is also capable of locating the device if it is being moved from one location to another. The in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non-functional. The said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
Accordingly the instant invention provides for a system and method for tracking an electronic device capable of communicating with cellular tower, said tracking system comprising of a CMOS enabled timer and a transceiver circuit incorporated into the mother circuit of the said electronic device in such a manner that any action to disturb the said circuit will render the said electronic device non-functional and a corresponding tower signal transceiver coupled in frequency to the transceiver circuits on the said electronic device, and a computerized server resident on the said cellular tower comprising means to isolate strength of the digital identity signal (DISS), such that, the said CMOS enabled timer circuit is kept in a running state; a predetermined input PASSKEY is entered by an authorized user within a stipulated time period, for resetting the said timer circuit, failing which, the said signal transceiver circuit on the said electronic device generates an SOS signal to be transmitted over the wireless communication channel to the said tower signal transceiver, whereupon the said tower signal transceiver sends an activation signal back to the transceiver section of the said CMOS enabled circuit, in response to which the transceiver part of the said electronic device generates a modulated digital identification signal (MDIS) to be transmitted to the signal transceiver on the said cellular tower, where it is demodulated and isolated to compare its strength with similar information (DISS) retrieved from other TRs on the said computerized server (CS) to ascertain the location the said electronic device which is forwarded to the authorized user, thereby enabling the tracking of the said electronic device irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered or the circuit is disturbed.
The said inbuilt power source is a CMOS circuit which draws the said required backup power from the said activating signal received at the said transceiver circuit on the said electronic device from the said cellular tower's signal transceiver in case the battery of the electronic device is removed or the said device is switched off.
The said activation signal is generated in response to the said SOS signal being received at the transceiver section of the said tower. The said transceiver circuit on the said electronic device includes an activation signal receiver to receive said AS from the said TR on the said tower in response to the SOS signal. The transceiver circuit on the said electronic device has a semi- passive signal emitter connected to the activation signal transceiver and the said CMOS enabled timer circuit on the said electronic device.
The said semi passive signal emitter generates the said modulated digital identification signal (MDIS) to be transmitted to the signal transceiver section of the said cellular tower. The said transceiver section configured to receive incoming modulated digital identification signal (MDIS) is coupled to a signal demodulator (D) to isolate the digital identity signal and the signal strength (DISS) from the said modulated digital identification signal (MDIS).
The PASSKEY is generated b a modified RSA algorithm and its stored in the read only portion of the storage unit attached to the microprocessor. The process of tampering with the IMEI number or the disturbing of the said circuit activates a circuit that is embedded in Cl thereby rendering the electronic device useless, said circuit Cl being the link that connects the tracking circuit (MH) with the mother circuit of the electronic device.
In an another embodiment the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted.
The instant invention also provides for a method for tracking an electronic device capable of communicating with cellular tower, said method comprising the steps of - keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating a SOS signal by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver on the cellular tower sending an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, generating a modulated digital identification signal (MDIS) by microprocessor from the data stored in the read only portion of the storage unit and transmitting of the said MDIS by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower, storing the said MDIS on a temporary storage database, demodulating and isolating the said signal and its strength, comparing the said demodulated and isolated signal and its strength with similar other information retrieved from other tranceivers on the said computerized server to ascertain the location of the said electronic device, and forwarding the information to the authorized user for tracking the said electronic device.
The tracking information on the said electronic device is provided irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered. The said tracked information comprises of co-ordinates of the location of the cellular device to the accuracy of atleast 1 meter, information on the nearest landmarks and a dynamically plotting map of the location of the tracked electronic device. The MDIS is generated by a program code resident on the microprocessor on the said electronic device. The stipulated time is a variable value entered by the authorized user according to his convenience after validating the PASSKEY
BRIEF DESCRIPTION OF THE INVENTION IN RELATION TO THE DRAWINGS:
The Figure 1 is a diagrammatic representation of the system of the present invention. The electronic device MH and the controlling tower are represented as circuits in integrated form. The various labeled components of the integrated circuit are :
PS indicating Power source; timer T; connecting circuit Cl; two input ports El an E2; linking circuits Ll, L2 which also handle power management; microprocessor MP that contains the main program Pr-I; Inverter I for power manipulation; SE or the semi passive signal emitter which also contains a small active signal emitter which sends the first communication signal; AST which is the activating signal transceiver; MDIS the modulated digital identity signal; TR the transceiver in the nearest tower; D the demodulator in the tower; DISS which refers to the digital identity and signal strength; S1,S2,S3 Sn are similar DISS information from other cellular towers in the vicinity of the electronic device; CS is the server a core network that shares a common database of information and has temporary and permanent storage databases for storing additional information; Pr-2, the program that controls database, manages DISS information, and performs comparison, mapping and tracking; OS: Information sent to the user
DETAILED DESCRIPTION OF THE INVENTION WITH REFERENCE TO DRAWINGS:
The ensuing description provides preferred exemplary embodiments only, and is not intended to limit the scope, applicability or configuration of the invention. Rather, the ensuing description of the embodiments will provide those skilled in the art with an enabling description for implementing several embodiments of the invention. Various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the invention as set forth in the appended claims.
Details are given in the following description to provide a thorough understanding of the described embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits are shown in block diagrams so as to not obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
The present invention is a system and apparatus for tracking of electronic devices capable of communicating with the cellular towers. The novelty aspect of the present specification lies in the fact that the electronic device can be traced to a fairly accurate range. Theoretically, the maximum error associated while calculating the coordinates of a place is 0.25% (theoretically). In practical cases it can go up to 1% because of error due to data loss. When converted to geographic scale, this corresponds to within 1 meter in metropolitan cities in India.
For better understanding of the invention, some of the terms are elucidated below: CMOS technology refers to Complementary Metal-Oxide Semiconductor technology. The CMOS circuit is used to power the system if the power supply is cut off. This circuit has inbuilt capacitor that will store electrostatic energy when it is connected to a power source. Later it utilizes the energy from the electromagnetic wave (AS signals) sent by the transreceiver located in the nearby tower. The CMOS circuit is quite similar to the conventional circuits used in gadgets.
The timer also receives energy from CMOS circuit which keeps it running even when the power is cut off. In the timer the stipulated time or the predetermined time period for the entry of the
PASSKEY can be altered after validation with the correct PASSKEY. Initially on purchase of the electronic device, a stipulated time value is predefined by the company. The user can change this time value after validating with the given passkey. It can have any value ranging from few minutes to few weeks (or even few months depending on the setting used in the program and the CMOS capability); but the timer will always be running. The program is coded such that the timer cannot be turned off.
Communication signal: This is similar to the roaming signal sent by a mobile phone to a tower. But here the signal will not contain any digital signal; rather it will be just a communicating signal to alert the tower to send the AS signal.
This bi-directional communication process is used to establish communication with the server. The process will be successfully done if the device is able to receive the AS from tower and revert back to the tower by sending the MDIS. The system can proceed only if the server is able to find a matching subscriber number in its database (ie. only if the device's number is there in the database).
The device can also be made to send the MDIS in the first step itself if the CMOS circuit is good enough to provide backup power for all the processes.
The Tracking process is quite akin to the conventional triangulation process. It has mainly three stages, namely, (a) the electronic device such as the mobile phone sends signal to nearby base stations, (b) Positioning software performs a triangulation calculation on the information from the base stations and (c) the data is converted into a geographical location.
Similarly the device also communicates with the nearby towers which may be more than one. Then by using the data sent by different towers, the software in the tower server calculates the position of the device by the process of triangulation. Triangulation is a process of determining the location of a point by measuring angles to it from known points at either end of a fixed baseline. Surveying error can also be minimized using various conventionally used methods. Key-pair Generation: The passkey is generated using key generation process in cryptography. Any public-key algorithm can be used for generating this PASSKEY (pseudorandom number generator (PRNG) algorithm can also be used).
For example, in the circuit constructed a modified RSA algorithm is used which will generate a pair of keys randomly. A sample program based on Java is available at http://publib.boulder.ibm.com/infocenter/wasinfo/v6rl/index.jsp ?topic=/com.ibm.websphere.expr ess.doc/info/exp/ae/rsec_ssldevkeypairgen.html. The normal program is altered in such a way that the password entry mechanism is removed and one of the keys acts as passkey for the circuit while the other key will be stored in the main program which is written on a Read-only portion of the storage unit attached to the microprocessor (MP). This process of storing the second passkey in the read-only portion means that even if a person cracks into the program he can not modify the code to suit his fake passkey. The program will be unlocked to change the timer setting only if the user enters the passkey with in the stipulated time. This key will be given by the company to the user while purchasing the device. The algorithm can be further altered by the company so as to get a passkey of suitable length and combination which an authorized person can remember.
Power source PS supplies power to the mobile handset circuit (MH) which includes the CMOS circuit and mother circuit; Timer T controls the stipulated time for asking the passkey and entering the passkey.
Cl or circuit 1 which is the connecting circuit with the mother circuit is an IC circuit that is embedded in the core device. It also contains another inbuilt circuit that will make the mother circuit futile by short-circuiting if the circuit is disturbed.
El and E2 are input ports 1 and 2 where the user can feed-in information to the circuit, while Ll and L2 are linking circuits that link the microprocessor to the IC and also handle power management.
Microprocessor MP contains the main program, one of the pair of keys generated and the control unit. The figure also shows the main program Pr-I that will ask for the passkey and match with pair-key stored in MP. The Pr-I also processes and controls the total working of the tracing mechanism. The program and passkey are stored in a read-only portion which prevents any cracking action
Inverter I provides for power manipulation. Semi passive signal emitter SE contains a small active signal emitter which sends the first communication signal to the tower. It is powered by the CMOS circuit that will receive power from the matching electromagnetic signal sent by the tower. The Activating signal transreceiver AST receives the activating signal from the tower to power the CMOS circuit. It can also be used to initiate the whole process, if necessary by slightly modifying the circuit.
Modulated Digital Identity Signal or the MDIS is sent by the mother device and contains a piece of information in encrypted format, that corresponds to unique id that is allotted to the device and stored in the database of the server located in the tower
TR is the Transreceiver in the tower. Its multiple uses for the purpose of this invention include a. sending the AS signal b. receiving the communication signal from the mother device and c. receiving the DISS info from the mother device
D or the demodulator in the tower, demodulates and decrypts to get the Digital Identity and Signal Strength (DISS) information and converts the signal strength to an absolute scale based on the stored algorithm, and feeds the information for processing. This also contains a mini-program. The DISS is signal strength that can be converted into absolute scale since its creation and conversion after detection are performed with the help of algorithms stored. The DISS information is obtained with the help of the mini program and stored in a temporary storage database. S1,S2,S3, Sn are similar DISS information from other towers
The server, CS is the core network that shares a common database which contains unique digital ids for devices, maps of various areas covered, conversion tool that maps the signal strength info from various towers in absolute scale to coordinates of a place, besides temporary storage databases for storing additional information, Pr-2 , tools for analysis, power and data backup mechanism etc.
Pr-2 or the Main Program No.2 controls database, manages DISS information, comparison, mapping, tracking, coordinate determination, finding landmarks in the area for easy location, sending information to user (based on the alternate contact information provided)
OS is the information sent to the user. As the CMOS circuit receives power from the tower, after a stipulated time, which is also set into the program in the mother device at the time of manufacturing the device, the device will constantly be sending information to the tower and which in turn will be communicating with the user. Hence the user will receive updated information about the current location of the device after every stipulated time interval.
In this embodiment of the present specification described herein the said electronic device can be traced if it is switched off or, the battery or the power back up has been removed. The circuit of the present specification is divided in two parts and thus installed separately where one half of the present invention is in-built into the mother board of the electronic device and the other corresponding half is installed in the cell towers of the cellular communication infrastructure or service provider's communication infrastructure. The said inbuilt circuit is incorporated in such a manner that if any one tries to tamper with this inbuilt circuit part of the present invention, the entire electronic unit will be affected.
In an embodiment of the present specification the position of the in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non functional, the said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
The said in-built circuit in the device circuit (Cl) comprises of the CMOS enabled timer circuit (T) and a transceiver section (AST). The term "CMOS enabled" refers to the backup power source such as a capacitor provided for the functioning of the inbuilt circuit. The timer is always running and can be only reset only if an authorized user resets it with a predetermined input, a PASSKEY, within a predetermined time period. The PASSKEY is set by the authorized user earlier and input into the electronic device by means of the user interface on the device such as a keypad. If no PASSKEY is entered or a wrong PASSKEY is input into the device when due within the stipulated time the timer circuit is not reset.
Though the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted; this method is least preferred as this mode has vulnerabilities. Instead it could be done by designing and embedding a proper circuit using a VLSI technique into the main circuit. The circuit will be made to respond to a signal by a specific service provider by conventional methods. This service is of course on the basis of a mutual understanding arrived at between the electronic device manufacturer and one or more service providers. The timer values can be adjusted in a range from 1 minute to few weeks.
This technology can be modified for use as a tracking device for any expensive electronic gadgets.
Any unauthorised attempts to reset the said running timer circuit or interruption as described above triggers a command to be forwarded to the transceiver section of the inbuilt circuit of the electronic device. The transceiver section comprises of a semi-passive emitter-cum-receiver (SE) and application means incorporated in the said inbuilt circuit to generate a special signal to be sent over the wireless communication connection to the nearest cell tower transceiver circuit. The application means can be described as a kind of sensory mechanism working in tandem with the said timer circuit to sense that the device has been missing or taken away from its authorized user thus triggering the above said command to the transmitter section of the inbuilt circuit on the said electronic device. The application means used can be changed from one electronic device to another thereby making it extremely difficult for the hackers to hack the said application.
But the above mentioned method has practical disadvantages. Hence it is not preferred. This special signal mentioned above upon reception at the other half of the invention described herein is a specific transreceiver module installed on the said cell tower's transceiver (TR) section induces the transmitter part of the said specific transceiver module to send an activation signal
(AS) to the corresponding AS receiver on the inbuilt circuit of the electronic device wherein the said AS receiver is activated by the activation signal from the tower of the service provider as the activation receiver (AS) is a frequency specific one, so that an electronic device can receive the signals only from a specific service provider which is transmitting signals from their respective tower that falls in that frequency range.
The said activation signal (AS) plays a very important and integral part in this scenario as this signal (AS) provides the said backup power to the said backup power source for example the said capacitor as in one embodiment of the present specification for enabling the functioning of the said CMOS enabled circuit. This backup power enables the said semi-passive transmitter to send an identification signal to the nearest and said frequency coupled transceiver section of the said cellular tower. The said identification signal is sent in the form of a (MDIS) modulated digital identification signal along with a specific number (like the IMIE number) in a particular embodiment of the present specification. The said MDIS is sent repeatedly to make sure that if the said electronic device is being moved from one location to another by an unauthorized user in an embodiment of the present specification, it can still be traced continuously by the said cell tower receiving that MDIS.
At the said cell tower the received MDIS is demodulated using demodulator means and the demodulated signal is further isolated to enable the strength of the said signal in form of Digital Identity Signal Strength (DISS). This DISS is further fed into a computerized comparator network along with similar DISS from other cell towers in the vicinity along with information regarding their tower location etc. where these said inputs are compared with the geographical information to determine the location of the said electronic device to a fairly accurate range.
Another functionality that is provided in the said embodiment of the present specification is the transceivers (TR) in the towers will in turn send the said specific 'number' like the IMIE number corresponding to the device as mentioned above to a database of the device numbers maintained in the said computerized network. The said database contains the details about the electronic device such as the authorized owner, alternate contact numbers etc. The said network further sends the said approximate traced location of the said electronic device to the said authorized owner and the service provider.
The invention describes a method for tracking an electronic device capable of communicating with cellular tower. The method comprising the steps of keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating an SOS signal, which is a communicating signal sent by the electronic device (MH) to the tower, by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver (TR). The electronic device sends an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, thereby generating a modulated digital identification signal (MDIS) by microprocessor and transmitted by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower.
The MDIS is generated by a program code resident on the microprocessor on the said electronic device. The MDIS is stored on a temporary storage database. The next step involves the demodulating and isolating of the said signal, comparing the said demodulated and isolated signal with similar other information retrieved from other TRs on the said computerized server to ascertain the location of the said electronic device, and forwarding the information to the authorized user for tracking the said electronic device.
It should be noted that the methods, systems and devices discussed above are intended merely to be exemplary in nature. Consequently, various embodiments may omit, substitute, or add various procedures or components as appropriate. For instance, it should be appreciated that in alternative embodiments, the methods may be performed in an order different than that described, and that various steps may be added, omitted or combined. Also, features described with respect to certain embodiments may be combined in various other embodiments.
Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the invention. Accordingly, the above description should not be taken as limiting the scope of the invention, which is defined in the following claims.

Claims

/ claim:
1. A system and method for tracking an electronic device (MH) capable of communicating with cellular tower (CT), said tracking system comprising of: a CMOS enabled timer (T) and a transceiver circuit (SE, AST) incorporated into the mother circuit of the said electronic device in such a manner that any action to disturb the said circuit will render the said electronic device non-functional and a corresponding tower signal transceiver (TR) coupled in frequency to the transceiver circuits (SE, AST) on the said electronic device, and a computerized server (CS) resident on the said cellular tower comprising means to isolate strength of the digital identity signal (DISS), such that, the said CMOS enabled timer circuit is kept in a running state a predetermined input PASSKEY is entered by an authorized user within a stipulated time period, for resetting the said timer circuit, failing which, the said signal transceiver circuit (SE, AST) on the said electronic device generates an SOS signal to be transmitted over the wireless communication channel to the said tower signal transceiver (TR), whereupon the said tower signal transceiver sends an activation signal (AS) back to the transceiver section of the said CMOS enabled circuit, in response to which the transceiver part of the said electronic device generates a modulated digital identification signal (MDIS) to be transmitted to the signal transceiver on the said cellular tower, where it is demodulated and isolated to compare its strength with similar information (DISS) retrieved from other tranceivers on the said computerized server (CS) to ascertain the location the said electronic device which is forwarded to the authorized user, thereby enabling the tracking of the said electronic device irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered or the circuit is disturbed.
2. A system for tracking an electronic device as claimed in claim 1 wherein the said inbuilt power source is a CMOS circuit which draws the said required backup power from the said activating signal received at the said transceiver circuit on the said electronic device from the said cellular tower's signal transceiver in case the battery of the electronic device is removed or the said device is switched off.
3. A system for tracking an electronic device as claimed in claim 1 wherein the said activation signal (AS) is generated in response to the said SOS signal being received at the transceiver section of the said tower.
4. A system for tracking an electronic device as claimed in claim 1 wherein the said transceiver circuit on the said electronic device includes an activation signal receiver to receive said AS from the said TR on the said tower in response to the SOS signal.
5. A system as claimed in claim 1 wherein said transceiver circuit (SE, AST) on the said electronic device has a semi-passive signal emitter (SE) connected to the activation signal transceiver (AST) and the said CMOS enabled timer circuit on the said electronic device.
6. A system as claimed in claim 5 wherein the said semi passive signal emitter (SE) generates the said modulated digital identification signal (MDIS) to be transmitted to the signal transceiver section (TR) of the said cellular tower (CT).
7. A system as claimed in claim 1 wherein the said transceiver section (TR) configured to receive incoming modulated digital identification signal (MDIS) is coupled to a signal demodulator (D) to isolate the digital identity signal and the signal strength (DISS) from the said modulated digital identification signal (MDIS).
8. A system as claimed in claim 1 wherein the said PASSKEY is generated b a modified RSA algorithm and its stored in the read only portion of the storage unit attached to the microprocessor (MP).
9. A system as claimed in claim 1 wherein the process of tampering with the IMEI number or the disturbing of the said circuit activates a circuit that is embedded in Cl thereby rendering the electronic device useless, said circuit Cl being the link that connects the tracking circuit (MH) with the mother circuit of the electronic device.
10. A method for tracking an electronic device capable of communicating with cellular tower as claimed in claim 1, said method comprising the steps of: keeping said timer circuit in a running state for periodically receiving a predetermined input from authorized user within the stipulated time, failing which, generating a SOS signal by the signal transceiver circuit SE, AST) on the said electronic device which is received by the said tower signal transceiver (TR) on the cellular tower (CT), sending an activation signal (AS) by the tower signal transceiver (TR) back to the transceiver section (AST) of the said CMOS enabled circuit, generating a modulated digital identification signal (MDIS) by microprocessor (MP) from the data stored in the read only portion of the storage unit and transmitting of the said MDIS by the transceiver section of the said electronic device for transmission to the signal transceiver (TR) on the said cellular tower (CT), storing the said MDIS on a temporary storage database, demodulating and isolating the said signal and its strength, comparing the said demodulated and isolated signal and its strength with similar other information retrieved from other transceivers on the said computerized server to ascertain the location of the said electronic device, and forwarding the information to the authorized user for tracking the said electronic device.
11. A method as claimed in claim 10 wherein the tracking information on the said electronic device is provided irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered.
12. A method as claimed in claim 10 wherein the said tracked information comprises of co- ordinates of the location of the cellular device to the accuracy of atleast 1 meter, information on the nearest landmarks and a dynamically plotting map of the location of the tracked electronic device.
13. A method as claimed in claim 10 wherein the MDIS is generated by a program code resident on the microprocessor on the said electronic device.
14. A method as claimed in claim 10 wherein the said stipulated time is a variable value entered by the authorized user according to his convenience after validating the PASSKEY.
PCT/IB2008/054572 2007-11-05 2008-11-04 A fail safe tracking system for electronic devices capable of communicating with cellular towers WO2009060375A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2529/CHE/2007 2007-11-05
IN2529CH2007 2007-11-05

Publications (2)

Publication Number Publication Date
WO2009060375A2 true WO2009060375A2 (en) 2009-05-14
WO2009060375A3 WO2009060375A3 (en) 2010-03-25

Family

ID=40626282

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/054572 WO2009060375A2 (en) 2007-11-05 2008-11-04 A fail safe tracking system for electronic devices capable of communicating with cellular towers

Country Status (1)

Country Link
WO (1) WO2009060375A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983449B1 (en) 2011-09-26 2015-03-17 Klone Mobile, LLC End user controlled temporary mobile phone service device swapping system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100274091B1 (en) * 1998-09-15 2000-12-15 윤종용 Chase aid device for mobile telephone
GB2398445A (en) * 2003-01-22 2004-08-18 Avon And Somerset Police Autho Location system
US6975872B2 (en) * 2004-03-26 2005-12-13 Benq Corporation Always-on method for reinforcing existing mobile station E911-based location detection services applications
US7446655B2 (en) * 2004-06-18 2008-11-04 Qualcomm Incorporated Tracking lost and stolen mobile devices using location technologies and equipment identifiers

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983449B1 (en) 2011-09-26 2015-03-17 Klone Mobile, LLC End user controlled temporary mobile phone service device swapping system and method

Also Published As

Publication number Publication date
WO2009060375A3 (en) 2010-03-25

Similar Documents

Publication Publication Date Title
US7292843B2 (en) Function-limiting device and function-limiting method
US6987975B1 (en) Method of generating control signals based on location of radio terminals
CN101223799B (en) Method for disabling a mobile device
EP1601216B1 (en) Mobile communication terminal
KR101764650B1 (en) Antitheft System Of Smart Device
JP2001238260A (en) Electronic device and specific information management method
EP1145096A2 (en) Mobile telephone auto pc logon
JPH0964967A (en) Dial lock system for portable telephone set
CN102215285A (en) Method and apparatus for protecting information in user terminal
KR100631689B1 (en) Theft prevention method and system of mobile communication terminal
CN105554225A (en) System and method for rapidly calling for help by employing communication device
CN104023315B (en) A kind of cipher-code input method and device based on geographical location information
EP2780900B1 (en) Systems and methods for recovering low power devices
JP2008250676A (en) Wireless tag system and wireless tag id information update method
CN101212806B (en) Mobile telephone tracking and anti-theft service implementation method
JP2007281861A (en) Terminal authentication method and mobile terminal device
CN109495894B (en) Method and system for preventing pseudo base station
JPWO2002071786A1 (en) Mobile communication system and apparatus constituting the system
JP2006350450A (en) Settlement system, settlement terminal, user terminal and settlement method
WO2009060375A2 (en) A fail safe tracking system for electronic devices capable of communicating with cellular towers
CN101291502B (en) Anti-theft method for mobile phone
KR20100011060A (en) Anti-theft system of digital apparatus and digital apparatus therefor
JP2004224265A (en) Vehicle theft prevention device, vehicle theft prevention system, and rental car theft prevention system
CN201726451U (en) Positioning and tracking alarm device based on mobile communication system
KR20160032641A (en) Method for Providing Location Based Service by using Bluetooth

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08847999

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载