`
`EXHIBIT H
`
`
`
`(12) United States Patent
`Baker
`
`USOO6696941B2
`(10) Patent No.:
`US 6,696,941 B2
`(45) Date of Patent:
`Feb. 24, 2004
`
`(54) THEFTALARM IN MOBILE DEVICE
`
`(75) Inventor: Thomas W. Baker, Orefield, PA (US)
`
`(73) ASSignee: his Systems Inc., Allentown, PA
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 09/944,367
`(22) Filed:
`Sep. 4, 2001
`(65)
`Prior Publication Data
`
`US 2003/0043034 A1 Mar. 6, 2003
`(51) Int. Cl. .................................................. G08B 1/08
`(52) U.S. Cl. ............................... 340/539.1; 340/539.11;
`340/539.32; 340/568.1; 340/568.7; 340/572.1;
`340/572.8; 455/38.1; 455/38.2
`(58) Field of Search ......................... 340/539.1, 593.11,
`34053913,539.15,5681,571,825.36,
`7.1, 7.2, 7.58, 7.6, 7.61, 7.62, 539.32, 568.7;
`455/38.2, 38.1
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,307,059 A * 4/1994 Connary et al. ............. 340/7.1
`
`4/1996 Marrs et al. ................. 340/7.1
`5,504,476 A
`5,970,389 A * 10/1999 Lewiner et al. ............ 455/31.2
`6,075,456. A
`6/2000 Park ........................... 340/7.1
`6,160,477 A 12/2000 Sandelman et al. ......... 340/506
`6,198.390 B1 * 3/2001 Schlager et al. ............ 340/540
`6.297,737 B1 * 10/2001 Irvin .......................... 340/.571
`
`* cited by examiner
`
`Primary Examiner Daryl Pope
`(74) Attorney, Agent, or Firm William H. Bollman
`(57)
`ABSTRACT
`
`A System and method for remotely triggering an audible
`alarm within a mobile phone is disclosed. A remote user
`calls the mobile phone and enters a personal identification
`number (PIN) attached to a remote calling device. The PIN
`is processed either within the mobile phone or within a
`tral
`ice. The PIN i
`dt
`tored PIN. A
`central service. Ine riN is compared to a pre-store
`match between the previously stored PIN and the PIN
`entered by the user produces a signal that triggers an audible
`alarm within mobile phone to deter theft and assist in
`recovery of a stolen mobile phone.
`
`24 Claims, 7 Drawing Sheets
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 2 of 13
`
`
`
`WIRELESS
`NETWORK
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 1 of 7
`
`US 6,696,941 B2
`
`FIC. 1
`
`
`
`ALARM
`PIN
`DETECTOR
`MODULE
`
`PROCESSOR
`
`ALARM
`PIN
`MEMORY
`
`OO
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 3 of 13
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 2 of 7
`
`US 6,696,941 B2
`
`FIC. 2
`
`
`
`
`
`WIREESS
`NETWORK
`
`140
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 4 of 13
`
`O
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 3 of 7
`
`US 6,696,941 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`FIG. 3
`
`MONITOR FOR
`IN-COMING CALL
`
`5
`2
`
`24
`
`25
`
`26
`
`IN-COMING
`CALL 2
`YES
`
`MONITOR FOR
`PIN ENTRY
`
`PROPER PIN
`ENTERED 2
`YES
`
`
`
`TRIGGER
`AUDIBLE ALARM
`
`7
`2
`
`
`
`
`
`
`
`28
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 5 of 13
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 4 of 7
`
`US 6,696,941 B2
`
`FIG. 4
`
`
`
`
`
`
`
`
`
`
`
`ENTER DISABLE
`AUDIBLE
`ALARM MENU
`YES
`
`REQUEST PIN
`
`
`
`30
`
`31
`
`IS PIN
`CORRECT 2
`YES
`
`32
`
`IS AUDIBLE
`ALARM ACTIVE 2
`
`
`
`
`
`DISABLE
`AUDIBLE ALARM
`
`33
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 6 of 13
`
`34
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 5 of 7
`
`US 6,696,941 B2
`
`FIC. 6
`PRIOR ART
`
`
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 7 of 13
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 6 of 7
`
`US 6,696,941 B2
`
`FIC.. 6
`PRIOR ART
`
`10
`
`12
`
`13
`
`
`
`
`
`
`
`LOCKING SETUP
`MENU CHOSEN ?
`YES
`
`ENTER PIN USED TO
`LOCK/UNLOCK PHONE
`
`RE-ENTER PIN USED TO
`LOCK/UNLOCK PHONE
`
`
`
`
`
`COMPARE PIN
`ENTERED IN 11
`AND 12 SAME 2
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 8 of 13
`
`
`
`U.S. Patent
`
`Feb. 24, 2004
`
`Sheet 7 of 7
`
`US 6,696,941 B2
`
`FIC. 7
`PRIOR ART
`
`ENTER LOCK/
`UNLOCK MENU
`YES
`
`REQUEST PIN
`
`17
`
`18
`
`IS PIN
`CORRECT 2
`YES
`
`IS PHONE
`LOCKED 2
`
`19
`
`
`
`
`
`20
`
`
`
`
`
`
`
`
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 9 of 13
`
`
`
`21
`
`LOCK PHONE
`
`22
`
`
`
`1
`THEFT ALARM IN MOBILE DEVICE
`
`US 6,696,941 B2
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`This invention relates generally to providing an audible
`alarm for a mobile phone. More particularly, it relates to a
`System and method for activating an audible alarm for a
`mobile phone to deter theft and assist in locating the mobile
`phone.
`2. Background of Related Art
`Mobile phones, Personal Digital Assistants, and other
`mobile wireleSS devices are Small, portable, and easily
`stolen. If a mobile phone or other hardware is stolen, there
`is liability that the their will use the stolen mobile device,
`causing the user to be billed for services initiated by the
`thief.
`One conventional way to protect a mobile phone or
`mobile wireleSS device is to add a lock/unlock personal
`identification number (PIN) to lock and unlock the device.
`Using Such a System, the device becomes disabled until a
`lock/unlock PIN is entered that matches a pre-stored lock/
`unlock PIN in memory of the mobile phone.
`FIG. 5 illustrates a conventional mobile phone comprising
`an external antenna 1, an on/off button 2, a speaker 3, a
`cancel button 4, a menu selection button 5, Scroll buttons 6
`and 7, a numerical keypad 8, and a microphone 9.
`In particular, as shown in FIG. 5, one conventional type
`mobile phone has a menu Selection button 5 for access to a
`menu that will lock and unlock the device. Scroll buttons 6
`and 7 allow a user to Scroll through a menu System to choose
`a desired function. Once a lock and/or unlock menu is
`entered, the numerical keypad 8 is used to enter a lock/
`unlock PIN that the user will later use to both lock or unlock
`the device. The cancel button 4 may be depressed if the user
`mistakenly enters an incorrect lock/unlock PIN or wants to
`exit the current menu function.
`FIG. 6 is a flow chart showing an exemplary process by
`which a lock/unlock PIN number is initially setup for use on
`a mobile phone.
`In particular, as shown in FIG. 6, a Software routine
`monitors keyboard entries to determine if a locking Setup
`menu is chosen 10. If the locking setup menu 10 is not
`chosen, the Software routine loops to continuously monitor
`if the user desires to enter the locking Setup menu.
`Once the user desires to enter the locking Setup menu, a
`routine is called that requires a user to enter a lock/unlock
`PIN that will be used to lock or unlock the mobile wireless
`device 11.
`A conventional method of assuring that a user enters the
`correct lock/unlock PIN is to have the user re-enter the
`lock/unlock PIN at routine 12. The lock/unlock PIN entered
`in routine 11 is compared with the lock/unlock PIN entered
`in routine 12. If the lock/unlock PIN entered in routine 11 is
`not the same as the lock/unlock PIN entered in routine 12,
`the program jumps back to routine 11 to force the user to
`begin the process over again to establish a lock/unlock PIN.
`If the lock/unlock PIN entered in routine 11 is the same as
`the lock/unlock PIN entered in routine 12, the program
`progresses to store the lock/unlock PIN 14.
`The lock/unlock PIN is preferably stored in non-volatile
`memory. Non-volatile memory allows the lock/unlock PIN
`number to be maintained even without a constant Source of
`power. The lock/unlock PIN would not be inadvertently
`erased if the battery power were allowed to run down, and
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 10 of 13
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`a thief would not be able to erase the lock/unlock PIN by
`Simply removing the battery pack.
`FIG. 7 is a flow chart showing an exemplary process by
`which a lock/unlock PIN number is entered to lock or unlock
`a mobile phone.
`In particular, as shown in FIG. 7, a software routine
`monitors if a lock and unlock menu is chosen 16. If the lock
`and unlock menu 16 is not chosen, the Software routine
`loops to continuously monitor if user desires to enter the
`lock and unlock menu 16. Once the user enters the lock and
`unlock menu, a routine is called that requires a user to enter
`a lock/unlock PIN 17 that will be used to lock and unlock the
`mobile phone.
`The entered lock/unlock PIN is compared to the lock/
`unlock PIN previously stored in memory 18 to determine if
`the proper lock/unlock PIN has been entered by the user. If
`the lock/unlock PIN entered by the user is not the same as
`the lock/unlock PIN stored in memory, the program
`branches back to the routine that requires the user to enter a
`lock/unlock PIN 17. If the lock/unlock PIN entered by the
`user is the same as the lock/unlock PIN stored in memory,
`the program continues on to determine the current State of
`the phone, either locked or unlocked 19. If a mobile phone
`is in a locked condition, a Software routine unlocks the
`mobile phone to allow full functionality for the user at step
`20. If the mobile phone is in an unlocked condition, the
`Software routine locks the mobile phone 21. Once either the
`unlocking routine 20 or the locking routine 21 are
`completed, the lock/unlock menu function is exited at Step
`22.
`Locking a mobile phone prevents further use, but does not
`assist a user in finding their mobile phone, nor does it deter
`a thief from hiding the phone on their perSon.
`There exists a need for an apparatus and method that
`discourages theft of a mobile phone, or if Stolen, assists the
`owner in locating their Stolen mobile phone.
`SUMMARY OF THE INVENTION
`In accordance with the principles of the present invention,
`a mobile phone having an alarm capable of being remotely
`triggered comprises a remote trigger detection element. The
`remote trigger detection element responds to an alarm
`personal identification number (PIN) entered by a remote
`user to produced an alarm Signal. The alarm Signal triggers
`an audible alarm within the mobile phone.
`A mobile phone having an alarm capable of being
`remotely triggered in accordance with another aspect of the
`present invention comprises a remote trigger detection ele
`ment. A remote user enters an alarm PIN from a remote
`location from the mobile phone. The alarm PIN is compared
`with a previously stored user alarm PIN for the mobile
`phone at a central location. A match between alarm PINs
`causes an alarm activation signal to be produced. If the PIN
`is Stored at a central location, the alarm activation signal is
`transmitted to the mobile phone. The mobile phone receives
`the alarm activation Signal and activates an audible alarm.
`A mobile phone having an alarm capable of being
`remotely triggered in accordance with another aspect of the
`present invention comprises a audible alarm disabling ele
`ment. An alarm PIN is entered into the mobile phone. The
`alarm PIN is compared to a previously stored alarm PIN
`within memory. A match between alarm PINs causes an
`active audible alarm to become disabled.
`BRIEF DESCRIPTION OF THE DRAWINGS
`Features and advantages of the present invention will
`become apparent to those skilled in the art from the follow
`ing description with reference to the drawings, in which:
`
`
`
`3
`FIG. 1 shows a mobile phone having an alarm PIN
`detection module in accordance with the principles of the
`present invention.
`FIG. 2 shows a conventional phone connected to a PSTN
`used to call a Stolen mobile phone in accordance with the
`principles of the present invention.
`FIG. 3 shows a flowchart for monitoring for an alarm PIN
`and triggering an audible alarm, in accordance with the
`principles of the present invention.
`FIG. 4 shows a flow chart for disabling an audible alarm,
`in accordance with the principles of the present invention.
`FIG. 5 shows a conventional mobile phone with menu
`access buttons.
`FIG. 6 shows a conventional flowchart of setting up a
`locking PIN number.
`FIG. 7 shows a conventional flowchart of locking and
`unlocking the operation of a mobile phone.
`DETAILED DESCRIPTION OF ILLUSTRATIVE
`EMBODIMENTS
`The present invention provides a method and apparatus
`for remotely triggering an audible alarm in a wireleSS device
`Such as a mobile phone.
`FIG. 1 shows a mobile phone having an alarm PIN
`detection module in accordance with the principles of the
`present invention.
`In particular, FIG. 1 shows a mobile phone 100 compris
`ing an alarm PIN detection module 200, a processor 210, and
`an alarm PIN memory 230, an antenna, and a speaker 220.
`In operation, the mobile phone 100 receives through its
`antenna 240 the alarm PIN used to both activate and/or
`deactivate the audible alarm produced by the speaker 220.
`An incoming data Signal containing conventional cellular
`data also contains an alarm PIN value. The incoming data
`Signal including the alarm PIN is processed by the processor
`210 to separate the PIN from extraneous data received
`through antenna 240. Processor 210 transfers the received
`alarm PIN to the alarm PIN detection module 200.
`Alarm PIN detection module 200 compares the alarm PIN
`received through antenna 240 with a previously stored alarm
`PIN in alarm PIN memory 230. If alarm PIN detection
`module 200 determines that a match exists between the
`alarm PIN received through antenna 240 and the alarm PIN
`stored in 230, alarm PIN detection module instructs proces
`Sor 210 to activate the speaker 220 to produce an audible
`alarm. The audible alarm produced by speaker 240 is used
`by a victim to locate the stolen mobile phone 100.
`FIG. 2 shows a phone 130 connected to a wired phone
`system 110 used to call a stolen mobile phone 100.
`In particular, a conventional phone 130 is used in a
`conventional manner to place a call over a public Service
`telephone network (PSTN) 110. The victim calls their own
`phone number in addition to entering the alarm PIN used to
`activate the theft alarm on the mobile phone. The call is
`routed in a conventional manner through a PSTN 110 to a
`cellular wireless network 140.
`The call reaches a phone 100 over the cellular wireless
`network 140. The alarm PIN entered by the victim is also
`transferred to the stolen mobile phone 100. Upon reception
`of the alarm PIN by the mobile phone 100, the speaker 220
`within the phone (as shown in FIG. 1) is activated to produce
`an audible tone that allows the victim to locate the mobile
`phone being held by a thief 120.
`The alarm PIN transferred to the stolen mobile phone 100
`can occur whether the phone is taken off-hook or remains
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 11 of 13
`
`US 6,696,941 B2
`
`4
`on-hook. In a similar manner that a mobile phone receives
`information, Such as caller ID, the Stolen mobile phone
`receives the alarm PIN data.
`If the stolen mobile phone 100 is powered off when a thief
`has stolen the mobile phone, the alarm PIN is periodically
`transmitted by the cellular wireless network 140 to activate
`the Speaker 220 once the phone is turned on. A confirmation
`Signal is then transmitted back to the cellular wireleSS
`network 140 confirming the activation of the speaker 220,
`ending the need to periodically transmit the alarm PIN to the
`mobile phone 100.
`Activation of the audible alarm over speaker 220 even
`when outside of the victim hearing range Still has the
`deterrent effect of alerting others that a thief 120 is near. This
`encourages a thief 120 to abandon the stolen mobile phone
`100, assisting the victim in recovering the mobile phone
`100.
`FIG. 3 shows a flowchart utilized to activate an audible
`alarm of a mobile phone, in accordance with a first embodi
`ment of the present invention.
`In particular, FIG. 3 shows an exemplary process to
`activate a mobile device Such as a mobile phone.
`In step 23, a software routine within the mobile phone
`monitors for an incoming call 23.
`In Step 24, a decision is made if an incoming call has been
`received by the mobile phone.
`If no incoming call has been received, the program loops
`back to Step 23 to continuously monitor for an incoming call.
`In Step 25, if an incoming call is available, the program
`continues to monitor for an alarm PIN entry from a remote
`user desiring to access the mobile phone.
`The alarm PIN is established by the mobile phone's
`owner in a manner Similar to Setting up a lock/unlock PIN
`as described in relation to FIG. 6 above. An alarm PIN setup
`menu is used to enter an alarm PIN value that is easily
`remembered by the mobile phone's owner.
`In step 26, it is determined whether or not an alarm PIN
`value has been transmitted from the remote user to the
`mobile phone. Importantly, in accordance with the principles
`of the present invention, a user may call their own phone and
`enter an alarm PIN. Once Such an alarm PIN has been
`entered, the remote user's alarm PIN is compared with the
`alarm PIN stored in the alarm PIN memory 230 of the
`mobile wireless device. If the proper alarm PIN has not been
`entered by a remote victim accessing their Stolen mobile
`phone, the program branches back to Step 25, monitoring for
`an alarm PIN entry. If the proper alarm PIN has been entered
`by a remote victim accessing their Stolen mobile phone, the
`program proceeds to Step 27, which triggers the audible
`alarm.
`The audible alarm can be turned off either by entering a
`menu function within the mobile phone or remotely calling
`the phone and again entering the alarm PIN value. A menu
`function within the mobile phone similar to the menu
`described above to lock/unlock the mobile phone is used to
`disable the audible alarm by entry of the alarm PIN through
`the mobile phone keypad 8, as shown in FIG. 5. Alternately,
`the audible alarm can be disable remotely by the mobile
`phone's owner again calling the mobile phone and entering
`an alarm PIN. An alarm PIN received a second time is used
`to disable the audible alarm in instances where the audible
`alarm is triggered by a mistaken belief the mobile phone was
`stolen, when it had in fact been borrowed.
`The routine 28 for triggering the audible alarm is exited
`once the alarm is activated.
`
`
`
`S
`In the preferred embodiment, a default alarm Sound
`distinct from a ringing Sound used when a conventional call
`is made to the mobile phone is configured for the mobile
`phone during manufacture.
`FIG. 4 shows a flow chart for disabling an audible alarm,
`in accordance with the principles of the present invention.
`In particular, FIG. 4 shows exemplary StepS used to
`deactivate a mobile phone in accordance with the invention.
`A Software routine within the mobile phone monitors if a
`user of the remote mobile phone desires to enter the menu
`for disabling the audible alarm. 29. If a user desires to enter
`the routine to disable the audible alarm, the program pro
`ceeds to step 30, requesting an alarm PIN. An alarm PIN is
`requested by the Software from the user, which is input
`through the exemplary keypad as shown in FIG. 5, item 8.
`Once an alarm PIN has been entered by a user of the
`mobile phone, a determination is made if the alarm PIN is
`correct at step 31. To determine if the alarm PIN is correct,
`the entered alarm PIN value is compared to an alarm PIN
`value previously entered, Stored in alarm pin memory 230.
`If the two values are identical, the program proceeds to Step
`32, a determination if the audible alarm is currently active.
`If the audible alarm is currently active, the program proceeds
`to step 33, disabling the audible alarm. If the audible alarm
`is not active, there are no further Steps required and the
`routine to disable the audible alarm is exited 34.
`The alarm 220 can be an audible alarm, a visible alarm
`Such as on the mobile wireleSS device's display, a vibrating
`alarm, and/or any other Suitable form of activating a Sensory
`output of the mobile wireless device.
`In an alternative embodiment, the audible alarm can be
`configured by a mobile wireless user to allow unique
`identification, e.g., to find their misplaced mobile phone in
`a crowded place. The unique audible alarm preferably is
`distinguishable from a typical audible ring indicating an
`incoming call.
`In one alternative embodiment, an alarm PIN can be
`entered by a remote user desiring access to the mobile
`wireless device even without the mobile wireless device
`becoming off-hook. An alarm PIN would immediately be
`entered by the remote user, and an alarm PIN is sent from a
`Service provider, Such as through a Global System for
`Mobile Communications (GSM) short message or via the
`service provider itself. The PIN can be sent over any of the
`mobile devices receive channels. In the alternate
`embodiment, the mobile wireleSS device would operate as
`described above to activate the audible alarm.
`In an alternate embodiment, the alarm PIN is stored at a
`central location remote from the mobile phone. When a user
`desires to trigger the alarm, the user enters the alarm PIN, as
`described above, at a remote location. The alarm PIN is then
`compared to a previously entered alarm PIN at a central
`location. A proper alarm PIN then causes an alarm trigger
`Signal to be transmitted from the central location to the
`mobile phone. The mobile phone processes the alarm trigger
`Signal to trigger the alarm on the mobile phone.
`In yet another embodiment, the triggering of the alarm of
`the mobile phone is used in conjunction with a disablement
`of the phone. Therefore, the mobile phone will not only
`provide a Sensory warning of a theft, but would also leave
`the mobile phone unusable.
`Although the present invention is described with refer
`ence to embodiments for triggering an audible alarm in a
`mobile phone, the principles of the present invention are
`equally applicable to the remote triggering of alarms in other
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 12 of 13
`
`US 6,696,941 B2
`
`6
`types of Stolen mobile receiving devices, e.g., in a Personal
`Digital ASSistant (PDA), in a pager, in a laptop, in a portable
`digital radio, etc.
`While the invention has been described with reference to
`the exemplary embodiments thereof, those skilled in the art
`will be able to make various modifications to the described
`embodiments of the invention without departing from the
`true Spirit and Scope of the invention.
`What is claimed is:
`1. A method of remotely triggering an alarm within a
`mobile wireleSS device, Said method comprising:
`receiving an alarm trigger Signal from a Service provider
`to Said mobile wireleSS device based on user authori
`Zation;
`triggering a Sensory output from Said mobile wireleSS
`device based on receipt of Said alarm trigger Signal
`from Said Service provider; and
`preventing a current holder of Said mobile wireleSS device
`from Stopping Said Sensory output unless an alarm PIN
`is manually entered by said holder into said mobile
`wireleSS device.
`2. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said Sensory output is an audible alarm.
`3. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said Sensory output is a visible alarm on a display.
`4. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said alarm is configurable.
`5. The method of remotely triggering an alarm within a
`mobile wireless device to claim 1, further comprising:
`comparing Said alarm PIN to a previously entered alarm
`PIN stored in said mobile wireless device.
`6. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said mobile wireleSS device is a wireleSS phone.
`7. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said mobile wireleSS device is a personal data assistant.
`8. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said mobile wireleSS device is a pager.
`9. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said mobile wireleSS device is a personal computer.
`10. A remotely triggering means for an alarm within a
`mobile wireleSS device comprising:
`means for receiving an alarm trigger Signal from a Service
`provider to Said mobile wireleSS device based on user
`authorization; and
`means for triggering a Sensory output based on receipt of
`Said alarm trigger Signal from Said Service provider;
`and
`means for preventing a current holder of Said mobile
`wireleSS device from Stopping Said Sensory output
`unless an alarm PIN is manually entered by said holder
`into said mobile wireless device.
`11. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said Sensory output is an audible alarm.
`12. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said Sensory output is a visible alarm on a display.
`
`
`
`5
`
`15
`
`7
`13. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said Sensory output is configurable.
`14. The remotely triggering means for an alarm within a
`mobile wireless device to claim 10, further comprising:
`a means for comparing Said alarm PIN to a previously
`entered alarm PIN stored in said mobile wireless
`device.
`15. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said mobile wireleSS device is a wireleSS phone.
`16. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said mobile wireleSS device is a personal data assistant.
`17. The remotely triggering means for an alarm within a
`mobile wireleSS device according to claim wherein:
`Said mobile wireleSS device is a pager.
`18. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, wherein:
`Said mobile wireleSS device is a laptop computer.
`19. The remotely triggering means for an alarm within a
`mobile wireless device according to claim 10, further com
`prising:
`means for authorizing said alarm PIN in said received
`alarm trigger Signal.
`20. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`
`8
`Said alarm trigger Signal is transmitted to Said mobile
`wireless device while said mobile wireless device is
`off-hook.
`21. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, further com
`prising:
`periodically transmitting Said alarm trigger signal to Said
`mobile wireleSS device until a confirmation signal is
`received indicating that Said mobile device has acti
`Vated Said Sensory output.
`22. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, further com
`prising:
`turning Said Sensory output off upon receipt of a Second
`reception of Said alarm trigger Signal.
`23. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, wherein:
`Said Sensory output is distinctive from a ring associated
`with ordinary receipt of a phone call.
`24. The method of remotely triggering an alarm within a
`mobile wireleSS device according to claim 1, further com
`prising:
`disabling ordinary operation of Said mobile device when
`Said alarm trigger Signal is received to activate Said
`Sensory output.
`
`US 6,696,941 B2
`
`25
`
`Case 1:22-cv-22706-RNS Document 1-25 Entered on FLSD Docket 08/25/2022 Page 13 of 13
`
`