[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/bbcode.php on line 483: preg_replace(): The /e modifier is no longer supported, use preg_replace_callback instead
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4752: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4754: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4755: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
[phpBB Debug] PHP Warning: in file [ROOT]/includes/functions.php on line 4756: Cannot modify header information - headers already sent by (output started at [ROOT]/includes/functions.php:3887)
FTA-N-More.Net • View topic - Apple may be looking to lock out unauthorized iOS users
Login    Forum    Search    FAQ     Radio

Board index » WiFi Zone » Wireless and Cellular Technology Discussions




Post new topic Reply to topic  [ 2 posts ] 
Author Message
 Post Posted: Fri Aug 20, 2010 9:46 am 
Offline
SUPER USER
User avatar

Joined: Fri Apr 09, 2010 11:07 pm
Posts: 645
Location: Boonies
Apple has applied for a patent on a method to differentiate between authorized and unauthorized users of a particular iOS device. Once an unauthorized user is detected, the device can then automatically disable certain features or send notifications to Twitter or other services.

The , titled "Systems and Methods for Identifying Unauthorized Users of an Electronic Device," describes several ways a device could sense who is using an iPhone or iPad. Among the methods considered are voice print analysis, photo analysis, heartbeat analysis (!), hacking attempts, or even "noting particular activities that can indicate suspicious behavior."

If the various analyses detect someone who is not authorized to use the device, it could set off a number of automated features designed to protect the device's data, suss out the offending party, and alert the device owner. Sensitive data could be backed up to a remote server and the device could be wiped. The device could automatically snap pictures of the unauthorized user and record the GPS coordinates of the device, as well as log keystrokes, phone calls, or other activity. That information could be sent along with an alert to any useful service, such as e-mail, voicemail, Twitter, Facebook, or a "cloud service" like MobileMe.

As AppleInsider notes, Apple apparently experimented with enabling the iPad to recognize different authorized users and automatically change some settings for that particular user. Such a feature could be somewhat useful on iPads, which are sometimes shared among family members in homes and among several users in schools and businesses.

This proposed patent takes the capability one step further, by effectively locking out snoopers and thieves altogether, and alerting the device user of possible improprieties. The features would no doubt be welcome to enterprise users, who need safeguards around data that may be on a mobile device.

_________________
Admit Nothing, Deny EVERYTHING, DEMAND Pr00f!


Top 
 Profile  
 
 Post Posted: Mon Aug 23, 2010 12:48 pm 
Offline
SUPER USER
User avatar

Joined: Thu Apr 15, 2010 6:36 pm
Posts: 664
Patent Details:

1 . A method for identifying an unauthorized user of an electronic device, the method comprising: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user’s operation of the electronic device in response to determining, wherein the unauthorized user’s operation comprises operations not related to the authentication; and transmitting an alert notification to a responsible party in response to gathering.

2 . The method of claim 1, wherein determining further comprises: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.

3 . The method of claim 1, wherein determining further comprises: identifying a particular activity performed by the current user that indicates suspicious behavior.

4 . The method of claim 3, wherein the particular activity comprises one or more of hacking the electronic device, jailbreaking the electronic device, unlocking the electronic device, removing a SIM card from the electronic device, and moving at least a predetermined distance away from a synced device.

5 . The method of claim 1, wherein gathering further comprises gathering one or more of screenshots, keylogs, communications packets served to the electronic device, and information related to a host device coupled to the electronic device.

6 . The method of claim 1, wherein the alert notification comprises a general message indicating that an unauthorized user has been detected.

7 . The method of claim 1, wherein the alert notification comprises at least a portion of the gathered information.

8 . The method of claim 1, further comprising: gathering information related to the identity of the unauthorized user in response to determining; and gathering information related to the location of the electronic device in response to determining.

9 . The method of claim 1, further comprising: restricting at least one function of the electronic device in response to determining.

10 . The method of claim 1, further comprising: transmitting sensitive data from the electronic device to a remote storage; and erasing the sensitive data from the electronic device.

11 . An electronic device operable to detect an unauthorized user of an electronic device, the electronic device comprising: a processor operable to: receive an input from a current user of the electronic device; determine the input is not associated with an authorized user of the electronic device; and record usage information of the electronic device in response to determining; and communications circuitry operable to transmit the usage information to a remote device.

12 . The electronic device of claim 11, further comprising: a microphone operable to record the voice of the current user; and wherein the processor is further operable to: compare the recorded voice with voice prints of authorized user of the electronic device; and determine that the recorded voice does not match the voice print of any authorized user of the electronic device.

13 . The electronic device of claim 11, further comprising: a heartbeat sensor operable to detect the heartbeat of the current user; and wherein the processor is further operable to: compare the detected heartbeat with heart signatures of each authorized user of the electronic device; and determine that detected the heartbeat does not match the heart signature of any authorized user of the electronic device.

14 . The electronic device of claim 11, further comprising: an input device operable to receive an authenticating input for authenticating a user of the electronic device; and wherein the processor is further operable to: determine that a predetermined number of successive incorrect authenticating inputs have been received.

15 . The electronic device of claim 11, further comprising: a camera operable to take a photograph of the vicinity of the electronic device; and positioning circuitry operable to determine current location information of the electronic device; and wherein the processor is further operable to: geotag the photograph by associating the photograph with the current location information.

16 . The electronic device of claim 11, further comprising: an accelerometer operable to record a vibration profile of the electronic device; and a signal processor operable to compare the recorded vibration profile with a library of vibration profiles to determine a current mode of transportation of the electronic device.

17 . A system comprising: an electronic device comprising; an input device operable to receive a password provided by a user; a camera operable to take a photograph of the user; a processor operable to: determine that a predetermined number of incorrect passwords have been successively received; direct the camera to take a photograph of the user; and generate an alert notification in response to the processor determining, wherein the alert notification comprises information related to the identity of the user and the photograph of the user; and communications circuitry operable to transmit the alert notification to a remote device.

18 . The system of claim 17, wherein: the camera is operable to take a plurality of photographs of the surroundings of the electronic device; and wherein the processor is further operable to: analyze each of the plurality of photographs to identify distinguishing landmarks in the photographs; and determine the location of each photograph based on the identified distinguishing landmarks.

19 . The system of claim 17, wherein the alert notification is transmitted via one of text message, facsimile, VoIP application, instant messaging application, on-line profile application, on-line blog application, and a cloud server.

20 . Machine-readable media for identifying unauthorized users of an electronic device, comprising machine-readable instructions recorded thereon for: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user’s operation of the electronic device in response to determining, wherein the unauthorized user’s operation comprises operations not related to authentication; and transmitting an alert notification to a responsible party in response to gathering.

21 . The machine-readable media of claim 20, further comprising machine-readable instructions recorded thereon for: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.


Top 
 Profile  
 
Display posts from previous:  Sort by  
 
Post new topic Reply to topic  [ 2 posts ] 

Board index » WiFi Zone » Wireless and Cellular Technology Discussions


Who is online

Users browsing this forum: No registered users and 2 guests

 
 

 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron