+

WO2009060375A2 - Système de localisation infaillible pour des dispositifs électroniques pouvant communiquer avec des stations de base - Google Patents

Système de localisation infaillible pour des dispositifs électroniques pouvant communiquer avec des stations de base Download PDF

Info

Publication number
WO2009060375A2
WO2009060375A2 PCT/IB2008/054572 IB2008054572W WO2009060375A2 WO 2009060375 A2 WO2009060375 A2 WO 2009060375A2 IB 2008054572 W IB2008054572 W IB 2008054572W WO 2009060375 A2 WO2009060375 A2 WO 2009060375A2
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
signal
circuit
transceiver
tower
Prior art date
Application number
PCT/IB2008/054572
Other languages
English (en)
Other versions
WO2009060375A3 (fr
Inventor
Aasis Vinayak P. G.
Original Assignee
Vinayak P G Aasis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vinayak P G Aasis filed Critical Vinayak P G Aasis
Publication of WO2009060375A2 publication Critical patent/WO2009060375A2/fr
Publication of WO2009060375A3 publication Critical patent/WO2009060375A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/74Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
    • G01S13/75Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders, or using passive reflectors
    • G01S13/751Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems using transponders powered from received waves, e.g. using passive transponders, or using passive reflectors wherein the responder or reflector radiates a coded signal
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/14Determining absolute distances from a plurality of spaced points of known location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • a fail safe tracking system for electronic devices capable of communicating with cellular towers capable of communicating with cellular towers.
  • This invention relates to a system and method for successful tracking of cellular communication enabled electronic devices irrespective of in a switched off state or even the power source (battery) has been removed
  • CEIR Central Equipment Identity Register
  • the mobile tracker which has been basically implemented by the cell phone manufacturers in their respective cellular devices using the existing state of the art cellular tower infrastructure.
  • the usual mobile tracker is simple. When a cellular phone is bought, the buyer sets two numbers in the mobile tracker application, then sets a password before using the cellular phone. If, perchance, the cellular phone is stolen and the SIM is removed, the mobile tracker comes in very handy. When a new SIM card is entered, the phone sends a message to the two numbers giving the phone number of the new phone. The stolen cell phone can then be tracked down to the new user using this information sent to the new numbers.
  • This advanced mobile tracker essentially gives the owner control over the phone once a new SIM card is entered.
  • the original user can switch off the phone, divert incoming calls and messages to a chosen number, lock the phone, format the phonebook and the to-do list to prevent data theft by sending messages to the phone.
  • a standard mobile tracker will send a message to a predefined number, giving the phone number of the new SIM card. This phone does this but also enables Long Distance Control, granting the original owner a lot of control over the stolen cellular phone even if another SIM card is inserted.
  • the main tasks include, switching off the cellphone (just once per message), diverting incoming calls to another cellphone whose number is added to the message, cancelling call diverting facility, sending all messages in the inbox and diverting all incoming messages to another number, canceling message divert, locking the phone and setting a password to unlock it, formatting the phone memory, deleting all contacts list, messages and other private data like to do lists and calendar entries.
  • the main drawback is that the number sending function is visible to the current user when it ought to have been done in the background, hiding the fact from the current user that it is sending a message to the true owner. Not only does this technology display a message on the screen that it is sending a message, if delivery reports function is enabled it displays a message saying that the message has been delivered. Further, it saves a copy of the send message in the
  • the United States Patent 7,409,219 describes a system and method for recovering a lost or stolen wireless device uses a power management application adapted to detect a low power level and instruct the client location application to determine the current geographic location but this patent is applicable for GPS services only. It detects and sends the current location before the power of the GPS unit is exhausted but does not address the problem of removal of battery or power switch off.
  • the object of the present invention is to provide a tracking system that can track an electronic device capable of communicating with a cellular tower regardless of whether the device is switched off, or the power source has been removed, or the SIM card removed / changed, the IMEI number tampered with.
  • the present invention obviates the drawbacks of the existing prior art by providing for a system and method to successfully track electronic devices having capability to communicate with cellular towers.
  • the system comprises an in-built CMOS enabled timer and transceiver circuit with power back-up integrated with the electronic device's mother circuit.
  • the timer circuit is kept in a running state set for a stipulated time and is only reset if a predetermined user input is fed into the electronic device within that stipulated time failing which an SOS signal is transmitted by the transceiver circuit to the nearest cell tower.
  • the SOS signal is of a lower frequency compared to the modulated digital identification signal (MDIS) so that it draws minimal power from the CMOS circuit.
  • MDIS modulated digital identification signal
  • the SOS induces the cell tower tracking system to send an activation signal to the electronic device.
  • This AS provides the power required by the power backup circuit for enabling the transceiver circuit to generate a modulated digital identification signal (MDIS) periodically.
  • MDIS modulated digital identification signal
  • the MDIS signal is unmodulated at the cell tower to isolate the digital identification signal strength (DISS) which is fed to a computerized comparator along with DISS from other nearby tower signal transceivers to compare and ascertain the relative location of the electronic device based on the relative intensity comparison of the two inputs.
  • the tracking system is also capable of locating the device if it is being moved from one location to another.
  • the in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non-functional.
  • the said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
  • the instant invention provides for a system and method for tracking an electronic device capable of communicating with cellular tower, said tracking system comprising of a CMOS enabled timer and a transceiver circuit incorporated into the mother circuit of the said electronic device in such a manner that any action to disturb the said circuit will render the said electronic device non-functional and a corresponding tower signal transceiver coupled in frequency to the transceiver circuits on the said electronic device, and a computerized server resident on the said cellular tower comprising means to isolate strength of the digital identity signal (DISS), such that, the said CMOS enabled timer circuit is kept in a running state; a predetermined input PASSKEY is entered by an authorized user within a stipulated time period, for resetting the said timer circuit, failing which, the said signal transceiver circuit on the said electronic device generates an SOS signal to be transmitted over the wireless communication channel to the said tower signal transceiver, whereupon the said tower signal transceiver sends an activation signal back to the transceiver section of
  • the said inbuilt power source is a CMOS circuit which draws the said required backup power from the said activating signal received at the said transceiver circuit on the said electronic device from the said cellular tower's signal transceiver in case the battery of the electronic device is removed or the said device is switched off.
  • the said activation signal is generated in response to the said SOS signal being received at the transceiver section of the said tower.
  • the said transceiver circuit on the said electronic device includes an activation signal receiver to receive said AS from the said TR on the said tower in response to the SOS signal.
  • the transceiver circuit on the said electronic device has a semi- passive signal emitter connected to the activation signal transceiver and the said CMOS enabled timer circuit on the said electronic device.
  • the said semi passive signal emitter generates the said modulated digital identification signal (MDIS) to be transmitted to the signal transceiver section of the said cellular tower.
  • the said transceiver section configured to receive incoming modulated digital identification signal (MDIS) is coupled to a signal demodulator (D) to isolate the digital identity signal and the signal strength (DISS) from the said modulated digital identification signal (MDIS).
  • the PASSKEY is generated b a modified RSA algorithm and its stored in the read only portion of the storage unit attached to the microprocessor.
  • the process of tampering with the IMEI number or the disturbing of the said circuit activates a circuit that is embedded in Cl thereby rendering the electronic device useless, said circuit Cl being the link that connects the tracking circuit (MH) with the mother circuit of the electronic device.
  • the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted.
  • the instant invention also provides for a method for tracking an electronic device capable of communicating with cellular tower, said method comprising the steps of - keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating a SOS signal by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver on the cellular tower sending an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, generating a modulated digital identification signal (MDIS) by microprocessor from the data stored in the read only portion of the storage unit and transmitting of the said MDIS by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower, storing the said MDIS on a temporary storage database, demodulating and isolating the said signal and its strength, comparing the said demodulated and isolated signal and its strength with similar other information retrieved from other tranceivers on the said computer
  • the tracking information on the said electronic device is provided irrespective of whether the said electronic device has been switched off, or the power backup has been removed or the subscriber identification module (SIM) has been removed or the IMEI number has been tampered.
  • the said tracked information comprises of co-ordinates of the location of the cellular device to the accuracy of atleast 1 meter, information on the nearest landmarks and a dynamically plotting map of the location of the tracked electronic device.
  • the MDIS is generated by a program code resident on the microprocessor on the said electronic device.
  • the stipulated time is a variable value entered by the authorized user according to his convenience after validating the PASSKEY
  • the Figure 1 is a diagrammatic representation of the system of the present invention.
  • the electronic device MH and the controlling tower are represented as circuits in integrated form.
  • the various labeled components of the integrated circuit are :
  • the present invention is a system and apparatus for tracking of electronic devices capable of communicating with the cellular towers.
  • the novelty aspect of the present specification lies in the fact that the electronic device can be traced to a fairly accurate range. Theoretically, the maximum error associated while calculating the coordinates of a place is 0.25% (theoretically). In practical cases it can go up to 1% because of error due to data loss. When converted to geographic scale, this corresponds to within 1 meter in metropolitan cities in India.
  • CMOS technology refers to Complementary Metal-Oxide Semiconductor technology.
  • the CMOS circuit is used to power the system if the power supply is cut off.
  • This circuit has inbuilt capacitor that will store electrostatic energy when it is connected to a power source. Later it utilizes the energy from the electromagnetic wave (AS signals) sent by the transreceiver located in the nearby tower.
  • the CMOS circuit is quite similar to the conventional circuits used in gadgets.
  • the timer also receives energy from CMOS circuit which keeps it running even when the power is cut off.
  • CMOS circuit which keeps it running even when the power is cut off.
  • PASSKEY can be altered after validation with the correct PASSKEY.
  • a stipulated time value is predefined by the company. The user can change this time value after validating with the given passkey. It can have any value ranging from few minutes to few weeks (or even few months depending on the setting used in the program and the CMOS capability); but the timer will always be running. The program is coded such that the timer cannot be turned off.
  • This bi-directional communication process is used to establish communication with the server. The process will be successfully done if the device is able to receive the AS from tower and revert back to the tower by sending the MDIS. The system can proceed only if the server is able to find a matching subscriber number in its database (ie. only if the device's number is there in the database).
  • the device can also be made to send the MDIS in the first step itself if the CMOS circuit is good enough to provide backup power for all the processes.
  • the Tracking process is quite akin to the conventional triangulation process. It has mainly three stages, namely, (a) the electronic device such as the mobile phone sends signal to nearby base stations, (b) Positioning software performs a triangulation calculation on the information from the base stations and (c) the data is converted into a geographical location.
  • the device also communicates with the nearby towers which may be more than one. Then by using the data sent by different towers, the software in the tower server calculates the position of the device by the process of triangulation. Triangulation is a process of determining the location of a point by measuring angles to it from known points at either end of a fixed baseline. Surveying error can also be minimized using various conventionally used methods.
  • Key-pair Generation The passkey is generated using key generation process in cryptography. Any public-key algorithm can be used for generating this PASSKEY (pseudorandom number generator (PRNG) algorithm can also be used).
  • a modified RSA algorithm is used which will generate a pair of keys randomly.
  • the normal program is altered in such a way that the password entry mechanism is removed and one of the keys acts as passkey for the circuit while the other key will be stored in the main program which is written on a Read-only portion of the storage unit attached to the microprocessor (MP).
  • MP microprocessor
  • This process of storing the second passkey in the read-only portion means that even if a person cracks into the program he can not modify the code to suit his fake passkey.
  • the program will be unlocked to change the timer setting only if the user enters the passkey with in the stipulated time. This key will be given by the company to the user while purchasing the device.
  • the algorithm can be further altered by the company so as to get a passkey of suitable length and combination which an authorized person can remember.
  • Power source PS supplies power to the mobile handset circuit (MH) which includes the CMOS circuit and mother circuit; Timer T controls the stipulated time for asking the passkey and entering the passkey.
  • MH mobile handset circuit
  • Timer T controls the stipulated time for asking the passkey and entering the passkey.
  • Cl or circuit 1 which is the connecting circuit with the mother circuit is an IC circuit that is embedded in the core device. It also contains another inbuilt circuit that will make the mother circuit futile by short-circuiting if the circuit is disturbed.
  • El and E2 are input ports 1 and 2 where the user can feed-in information to the circuit, while Ll and L2 are linking circuits that link the microprocessor to the IC and also handle power management.
  • Microprocessor MP contains the main program, one of the pair of keys generated and the control unit.
  • the figure also shows the main program Pr-I that will ask for the passkey and match with pair-key stored in MP.
  • Pr-I also processes and controls the total working of the tracing mechanism.
  • the program and passkey are stored in a read-only portion which prevents any cracking action
  • Inverter I provides for power manipulation.
  • Semi passive signal emitter SE contains a small active signal emitter which sends the first communication signal to the tower. It is powered by the CMOS circuit that will receive power from the matching electromagnetic signal sent by the tower.
  • the Activating signal transreceiver AST receives the activating signal from the tower to power the CMOS circuit. It can also be used to initiate the whole process, if necessary by slightly modifying the circuit.
  • Modulated Digital Identity Signal or the MDIS is sent by the mother device and contains a piece of information in encrypted format, that corresponds to unique id that is allotted to the device and stored in the database of the server located in the tower
  • TR is the Transreceiver in the tower. Its multiple uses for the purpose of this invention include a. sending the AS signal b. receiving the communication signal from the mother device and c. receiving the DISS info from the mother device
  • D or the demodulator in the tower demodulates and decrypts to get the Digital Identity and Signal Strength (DISS) information and converts the signal strength to an absolute scale based on the stored algorithm, and feeds the information for processing.
  • This also contains a mini-program.
  • the DISS is signal strength that can be converted into absolute scale since its creation and conversion after detection are performed with the help of algorithms stored.
  • the DISS information is obtained with the help of the mini program and stored in a temporary storage database. S1,S2,S3, Sn are similar DISS information from other towers
  • the server, CS is the core network that shares a common database which contains unique digital ids for devices, maps of various areas covered, conversion tool that maps the signal strength info from various towers in absolute scale to coordinates of a place, besides temporary storage databases for storing additional information, Pr-2 , tools for analysis, power and data backup mechanism etc.
  • Pr-2 or the Main Program No.2 controls database, manages DISS information, comparison, mapping, tracking, coordinate determination, finding landmarks in the area for easy location, sending information to user (based on the alternate contact information provided)
  • the OS is the information sent to the user.
  • the CMOS circuit receives power from the tower, after a stipulated time, which is also set into the program in the mother device at the time of manufacturing the device, the device will constantly be sending information to the tower and which in turn will be communicating with the user. Hence the user will receive updated information about the current location of the device after every stipulated time interval.
  • the said electronic device can be traced if it is switched off or, the battery or the power back up has been removed.
  • the circuit of the present specification is divided in two parts and thus installed separately where one half of the present invention is in-built into the mother board of the electronic device and the other corresponding half is installed in the cell towers of the cellular communication infrastructure or service provider's communication infrastructure.
  • the said inbuilt circuit is incorporated in such a manner that if any one tries to tamper with this inbuilt circuit part of the present invention, the entire electronic unit will be affected.
  • the position of the in-built circuit in the mother circuit has been positioned in such a way that if it is disturbed the electronic device is rendered non functional, the said functionality can be achieved by using an appropriate VLSI method which is a well documented technology for those skilled in the art.
  • the said in-built circuit in the device circuit comprises of the CMOS enabled timer circuit (T) and a transceiver section (AST).
  • CMOS enabled refers to the backup power source such as a capacitor provided for the functioning of the inbuilt circuit.
  • the timer is always running and can be only reset only if an authorized user resets it with a predetermined input, a PASSKEY, within a predetermined time period.
  • the PASSKEY is set by the authorized user earlier and input into the electronic device by means of the user interface on the device such as a keypad. If no PASSKEY is entered or a wrong PASSKEY is input into the device when due within the stipulated time the timer circuit is not reset.
  • the timer can also be interrupted by insertion of a particular service provider's SIM card in the said electronic device where the electronic device is a cellular phone having a SIM slot for the SIM card to be inserted; this method is least preferred as this mode has vulnerabilities. Instead it could be done by designing and embedding a proper circuit using a VLSI technique into the main circuit. The circuit will be made to respond to a signal by a specific service provider by conventional methods. This service is of course on the basis of a mutual understanding arrived at between the electronic device manufacturer and one or more service providers.
  • the timer values can be adjusted in a range from 1 minute to few weeks.
  • This technology can be modified for use as a tracking device for any expensive electronic gadgets.
  • the transceiver section comprises of a semi-passive emitter-cum-receiver (SE) and application means incorporated in the said inbuilt circuit to generate a special signal to be sent over the wireless communication connection to the nearest cell tower transceiver circuit.
  • SE semi-passive emitter-cum-receiver
  • the application means can be described as a kind of sensory mechanism working in tandem with the said timer circuit to sense that the device has been missing or taken away from its authorized user thus triggering the above said command to the transmitter section of the inbuilt circuit on the said electronic device.
  • the application means used can be changed from one electronic device to another thereby making it extremely difficult for the hackers to hack the said application.
  • This special signal mentioned above upon reception at the other half of the invention described herein is a specific transreceiver module installed on the said cell tower's transceiver (TR) section induces the transmitter part of the said specific transceiver module to send an activation signal
  • AS activation receiver
  • the said activation signal (AS) plays a very important and integral part in this scenario as this signal (AS) provides the said backup power to the said backup power source for example the said capacitor as in one embodiment of the present specification for enabling the functioning of the said CMOS enabled circuit.
  • This backup power enables the said semi-passive transmitter to send an identification signal to the nearest and said frequency coupled transceiver section of the said cellular tower.
  • the said identification signal is sent in the form of a (MDIS) modulated digital identification signal along with a specific number (like the IMIE number) in a particular embodiment of the present specification.
  • the said MDIS is sent repeatedly to make sure that if the said electronic device is being moved from one location to another by an unauthorized user in an embodiment of the present specification, it can still be traced continuously by the said cell tower receiving that MDIS.
  • the received MDIS is demodulated using demodulator means and the demodulated signal is further isolated to enable the strength of the said signal in form of Digital Identity Signal Strength (DISS).
  • DISS Digital Identity Signal Strength
  • This DISS is further fed into a computerized comparator network along with similar DISS from other cell towers in the vicinity along with information regarding their tower location etc. where these said inputs are compared with the geographical information to determine the location of the said electronic device to a fairly accurate range.
  • transceivers (TR) in the towers will in turn send the said specific 'number' like the IMIE number corresponding to the device as mentioned above to a database of the device numbers maintained in the said computerized network.
  • the said database contains the details about the electronic device such as the authorized owner, alternate contact numbers etc.
  • the said network further sends the said approximate traced location of the said electronic device to the said authorized owner and the service provider.
  • the invention describes a method for tracking an electronic device capable of communicating with cellular tower.
  • the method comprising the steps of keeping the said timer circuit in a running state for periodically receiving a predetermined input from the authorized user within the stipulated time, failing which, generating an SOS signal, which is a communicating signal sent by the electronic device (MH) to the tower, by the signal transceiver circuit on the said electronic device which is received by the said tower signal transceiver (TR).
  • the electronic device sends an activation signal by the tower signal transceiver back to the transceiver section of the said CMOS enabled circuit, thereby generating a modulated digital identification signal (MDIS) by microprocessor and transmitted by the transceiver section of the said electronic device for transmission to the signal transceiver on the said cellular tower.
  • MDIS modulated digital identification signal
  • the MDIS is generated by a program code resident on the microprocessor on the said electronic device.
  • the MDIS is stored on a temporary storage database.
  • the next step involves the demodulating and isolating of the said signal, comparing the said demodulated and isolated signal with similar other information retrieved from other TRs on the said computerized server to ascertain the location of the said electronic device, and forwarding the information to the authorized user for tracking the said electronic device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne des systèmes et des appareils permettant une localisation réussie de dispositifs électroniques pouvant communiquer avec des stations de base. Le circuit spécifié dans la description est divisé en deux parties séparées, une partie étant placée sur la carte mère du dispositif électronique et l'autre partie correspondante étant installée dans les stations de base de l'infrastructure de communications cellulaire. Dans un mode de réalisation de l'invention, le système comprend un registre d'horloge comprenant un CMOS intégré doté d'un circuit électrique de secours et un circuit émetteur-récepteur intégré au circuit mère du dispositif électronique qui transmet un SOS à la station de base la plus proche. L'activation du signal SOS dépend du circuit de registre d'horloge qui a été maintenu à l'état de marche sur un intervalle prédéterminé et qui est uniquement réinitialisé lorsqu'une entrée utilisateur prédéterminée n'est pas introduite dans le dispositif électronique dans l'intervalle temporel. Le SOS provoque l'envoi d'un signal d'activation par le système de suivi de la station de base vers le dispositif électronique. Le signal d'activation (AS) fournit l'énergie nécessaire au circuit de secours, ce qui permet au circuit émetteur-récepteur de produire un signal d'identification numérique modulé (MDIS). Le signal MDIS n'est pas modulé sur la station de base pour isoler la résistance au signal d'identification numérique (DISS), qui est introduit dans un comparateur informatique avec un DISS d'un autre émetteur-récepteur (TR) de signaux de station, ce qui permet la comparaison et la détermination de la position relative du dispositif électronique sur la base de la comparaison d'intensités relatives des deux entrées. Le système de suivi est également capable de situer le dispositif lorsque celui-ci a été déplacé d'un emplacement à un autre. Le circuit est intégré à la carte mère d'un dispositif électronique, de façon à ce qu'une tentative de détérioration rende le dispositif électronique inutilisable.
PCT/IB2008/054572 2007-11-05 2008-11-04 Système de localisation infaillible pour des dispositifs électroniques pouvant communiquer avec des stations de base WO2009060375A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2529/CHE/2007 2007-11-05
IN2529CH2007 2007-11-05

Publications (2)

Publication Number Publication Date
WO2009060375A2 true WO2009060375A2 (fr) 2009-05-14
WO2009060375A3 WO2009060375A3 (fr) 2010-03-25

Family

ID=40626282

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/054572 WO2009060375A2 (fr) 2007-11-05 2008-11-04 Système de localisation infaillible pour des dispositifs électroniques pouvant communiquer avec des stations de base

Country Status (1)

Country Link
WO (1) WO2009060375A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983449B1 (en) 2011-09-26 2015-03-17 Klone Mobile, LLC End user controlled temporary mobile phone service device swapping system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100274091B1 (ko) * 1998-09-15 2000-12-15 윤종용 휴대용 무선 전화기에서 위치 추적 보조장치
GB2398445A (en) * 2003-01-22 2004-08-18 Avon And Somerset Police Autho Location system
US6975872B2 (en) * 2004-03-26 2005-12-13 Benq Corporation Always-on method for reinforcing existing mobile station E911-based location detection services applications
US7446655B2 (en) * 2004-06-18 2008-11-04 Qualcomm Incorporated Tracking lost and stolen mobile devices using location technologies and equipment identifiers

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983449B1 (en) 2011-09-26 2015-03-17 Klone Mobile, LLC End user controlled temporary mobile phone service device swapping system and method

Also Published As

Publication number Publication date
WO2009060375A3 (fr) 2010-03-25

Similar Documents

Publication Publication Date Title
US7292843B2 (en) Function-limiting device and function-limiting method
US6987975B1 (en) Method of generating control signals based on location of radio terminals
CN101223799B (zh) 用于禁用移动设备的方法
EP1601216B1 (fr) Terminal de communication mobile
KR101764650B1 (ko) 스마트 기기의 도난 방지 장치
JP2001238260A (ja) 電子機器及び固有情報管理方法
EP1145096A2 (fr) Procedure de mise en communication automatique avec un pc pour un telephone mobile
JPH0964967A (ja) 携帯電話機のダイヤルロックシステム
CN102215285A (zh) 保护用户终端中的信息的方法和设备
KR100631689B1 (ko) 이동통신단말기의 도용 방지 방법 및 시스템
CN105554225A (zh) 一种利用通讯装置实现快速求救的系统及方法
CN104023315B (zh) 一种基于地理位置信息的密码输入方法及装置
EP2780900B1 (fr) Systèmes et procédés de récupération de dispositifs de faible puissance
JP2008250676A (ja) 無線タグシステムおよび無線タグid情報更新方法
CN101212806B (zh) 一种手机跟踪反盗服务的实现方法
JP2007281861A (ja) 端末認証方法及び携帯端末装置
CN109495894B (zh) 一种伪基站的防范方法及系统
JPWO2002071786A1 (ja) 移動通信システム及び該システムを構成する装置
JP2006350450A (ja) 決済システム、決済端末、ユーザ端末及び決済方法
WO2009060375A2 (fr) Système de localisation infaillible pour des dispositifs électroniques pouvant communiquer avec des stations de base
CN101291502B (zh) 一种手机防盗方法
KR20100011060A (ko) 디지털 기기의 도난 방지 시스템 및 이를 위한 디지털 기기
JP2004224265A (ja) 車両盗難防止装置、車両盗難防止システム及びレンタカー盗難防止システム
CN201726451U (zh) 一种基于移动通讯系统的定位跟踪报警装置
KR20160032641A (ko) 블루투스를 이용한 위치 기반 서비스 제공 방법

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08847999

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载