`Helle
`
`USOO6662O23B1
`(10) Patent No.:
`US 6,662,023 B1
`(45) Date of Patent:
`Dec. 9, 2003
`
`(54) METHOD AND APPARATUS FOR
`CONTROLLING AND SECURING MOBILE
`PHONES THAT ARE LOST, STOLEN OR
`MISUSED
`(75) Inventor: Seppo Helle, Paimio (FI)
`(73) Assignee: Nokia Mobile Phones Ltd., Espoo (FI)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 505 days.
`(21) Appl. No.: 09/610,769
`1-1.
`(22) Filed:
`Jul. 6, 2000
`(51) Int. Cl. ............................. H04B 1/38, H04M 1/00
`(52) U.S. Cl. ........................ 455/558; 455/411; 455/419
`(58) Field of Search ................................. 455/410, 411,
`455/418, 419,558; 379/356.01, 357.01,
`357.02
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`5,231,375 A 7/1993 Sanders et al. ............. 340/568
`5,406.260 A 4/1995 Cummings et al. ......... 340/568
`5,675,321 A 10/1997 McBride .............. ... 34.0/568
`5,898,783 A * 4/1999 Rohrbach .................... 380/49
`5.940,773. A
`8/1999 Barvesten .....
`... 455/558
`5.987,609 A * 11/1999 Hasebe ....................... 713/200
`6,075,456 A * 6/2000 Park .............
`... 340/825.44
`6,119,020 A * 9/2000 Miller et al.......
`... 455/558
`6,128,511 A * 10/2000 Irie ..............
`... 455/558
`6,138,005. A * 10/2000 Park ........................... 455/411
`
`FOREIGN PATENT DOCUMENTS
`St.
`E.
`9629638
`9/1996
`OOO118O
`1/2000
`
`W
`WO
`WO
`
`OTHER PUBLICATIONS
`Patent Abstracts of Japan No. 09027087, Jan. 28, 1997 for
`R
`E's, Appin 07–177259, Kumeuchi Kiyotaka,
`eCl Jul. 13,
`* cited by examiner
`Primary Examiner Vivian Chin
`ASSistant Examiner Tuan Tran
`(74) Attorney, Agent, or Firm Ware, Fressola, Van Der
`Sluys & Adolphson LLP
`(57)
`ABSTRACT
`A method and apparatus is provided for controlling a mobile
`phone when it has been lost or Stolen in order to prevent its
`use except to help the owner find it. Controlling the phone
`remotely may be implemented via a known Short Messaging
`System, for example. The Security features provided are as
`follows: (1) Displaying contact information (phone number)
`of the owner on Screen when the mobile phone can not start
`up normally, for example, due to an incorrect Security code
`entry; (2) Setting the mobile phone in a Secure State where
`it can only be used to call one number (Emergency calls are
`of course always possible.); and (3) Commanding the
`mobile phone to Send information about its location and
`usage Via SMS to a given number.
`
`56 Claims, 3 Drawing Sheets
`
`Security and Control Modules
`
`Security Mode Modules
`
`Owner
`lifornation
`Display Module
`
`Remote-Controlled
`Secure Mode
`Module
`
`Status
`Message
`Module
`
`12 - Oata Bus to from
`Signal Processor
`
`Control Messages Modules
`
`Transfer of
`Control
`Messages
`Module
`
`
`
`62
`
`Control
`arguage
`Module
`
`EX-1008
`US Patent 10,789,393
`
`
`
`U.S. Patent
`
`Dec. 9, 2003
`
`Sheet 1 of 3
`
`US 6,662,023 B1
`
`10 - Mobile Phone
`Ya
`
`
`
`
`
`1.
`
`TeleCommunications
`
`8
`
`Position
`LOCation
`Module
`
`14
`
`Antenna
`Modul
`Ue
`
`Microphone/
`Earoi
`piece
`Module
`
`12
`
`Si
`ignal
`P
`OCeSSO?
`
`28
`
`d
`sey and
`intro
`Modul
`Ioaules
`(Figure 2)
`
`
`
`Read Only
`Memory
`
`Keyboard
`Module
`
`26
`
`
`
`
`
`
`
`FIG. 1
`
`
`
`U.S. Patent
`
`Dec. 9, 2003
`
`Sheet 2 of 3
`
`US 6,662,023 B1
`
`
`
`Security and Control Modules
`
`Security Mode Modules
`
`Owner
`information
`Display Module
`
`Remote-Controlled
`Secure Mode
`Module
`
`Status
`Message
`Module
`
`12 - Data Bus to/from
`Signal Processor (Fig. 1)
`
`Control Messages Modules
`
`Transfer of
`Control
`Messages
`Module
`
`Control
`large
`
`FIG.2
`
`
`
`U.S. Patent
`
`Dec. 9, 2003
`
`Sheet 3 of 3
`
`US 6,662,023 B1
`
`PhOne is locked.
`Call the owner
`O2654.32
`
`
`
`
`
`FIG. 3: Phone locked display, PIN query cancelled.
`
`
`
`Phone is locked.
`Call the Owner
`02654321
`
`Call
`FIG. 4: Phone locked display, SIM card available.
`This phone is lost.
`Please Call
`02654321
`
`
`
`Call
`FIG. 5: Phone lost display
`This phone is stolen.
`Please call
`O2654.32
`
`
`
`Call
`FIG. 6: Phone stolen display.
`
`
`
`US 6,662,023 B1
`
`1
`METHOD AND APPARATUS FOR
`CONTROLLING AND SECURING MOBILE
`PHONES THAT ARE LOST, STOLEN OR
`MISUSED
`
`2
`The Security code is not needed in daily use. (However,
`the PIN code query in the SIM card would still be needed in
`order to prevent the use of the SIM card in other phones.)
`The mobile phone can be used to inform the owner about
`its location.
`The method and apparatus of the present invention also
`complement and enhance the other Security mechanisms
`already in use.
`
`BRIEF DESCRIPTION OF THE DRAWING
`The drawing includes the following:
`FIG. 1 is a block diagram of a mobile phone that is the
`Subject matter of the present invention.
`FIG. 2 is a block diagram of Security and control modules
`of the mobile phone shown in FIG. 1.
`FIG. 3 is a phone locked display message for displaying
`on the mobile phone shown in FIG. 1.
`FIG. 4 is a phone locked display message for displaying
`on the mobile phone shown in FIG. 1.
`FIG. 5 is a phone lost display message for displaying on
`the mobile phone shown in FIG. 1.
`FIG. 6 is a phone Stolen display message for displaying on
`the mobile phone shown in FIG. 1.
`
`DETAILED DESCRIPTION OF INVENTION
`FIG. 1 shows the mobile phone generally indicated as 10
`that is the Subject matter of the patent application, for use in
`connection with a telecommunication network 11. The Scope
`of the invention is also intended to cover other mobile
`electronic devices, Such as a portable computer.
`The mobile phone 10 includes a signal processor 12
`connected to an antenna module 14 having an antenna 15, a
`display module 16, a position location module 18, a
`microphone/earpiece module 20, a read only memory 22, a
`keyboard module 24 and a random acceSS memory 26,
`which are all known in the art. The operation of the Signal
`processor 12 in relation to the aforementioned elements is
`also known in the art. Moreover, the Scope of the invention
`is not intended to be limited to any particular kind or type of
`these elements.
`The Signal processor 12 is also connected to Security and
`control modules 28. The whole thrust of the invention relates
`to the operation of the security and control modules 28 with
`respect to the security and control of the mobile phone 10,
`especially by remote control.
`FIG. 2 shows in detail the security and control modules
`28, which will be described in relation to the various security
`and control applications Set forth below.
`
`SECURITY APPLICATIONS
`The security and control modules 28 include an owner
`information display module 52, a remote-controlled Secure
`mode module 54 and a status message module 56 which are
`discussed below.
`
`Owner Information Display
`In FIG. 2, the owner information display module 52
`operates to enhance current Security concepts by providing
`contact information of the owner of the mobile phone 10
`(FIG. 1) for cases where the mobile phone 10 is found by
`Someone else.
`The random access memory 26 (FIG. 1) in the mobile
`phone 10 contains fields where the owner/user can store
`
`1O
`
`15
`
`BACKGROUND OF THE INVENTION
`1. Field of Invention
`The present invention relates to a mobile phone; and more
`particularly, to the Security and control of a mobile phone
`that is lost, Stolen, or misused.
`2. Description of Related Art
`Various Security mechanisms for mobile phones exist:
`A SIM card having a PIN code is known in the art. If a
`code query is active the SIM card cannot be used for calling.
`Mobile phones also have security code features which
`prevent the use of the mobile phone, or restrict it (e.g.
`preventing the use of a phone number memory). When the
`feature is active, a code is asked at Startup.
`Another Security measure is to use a keypadlock that can
`require a Security code when opened. It is also possible to
`turn the keypad lock on automatically, for example, after a
`timeout when the mobile phone is not used.
`However, the known anti-theft features do have disad
`Vantages:
`For example, if a phone has been lost with the power on,
`anyone can use it as long as it remains on. Only automatic
`locking when the mobile phone is not used prevents this.
`Some Security Schemes load the user during daily use.
`When the user has to type in a Security code each time the
`mobile phone powers on, or even each time when the keypad
`lock is opened, it can be seen as unnecessary work most of
`the time. The cases where a mobile phone gets lost are quite
`rare, after all.
`There is no easy way for the person who has found a lost
`phone to contact the owner, especially if the mobile phone
`has Some kind of lock preventing the use of it.
`SUMMARY OF INVENTION
`In Summary, the present invention provides a method and
`apparatus for controlling a mobile electronics device,
`including a mobile phone or laptop computer, when it has
`been lost, Stolen or misused in order to prevent its use except
`45
`to help the owner find it. Controlling the mobile phone
`remotely may be achieved, for example, via a Short MeS
`saging System (SMS). The security features are as follows:
`1) Displaying contact information (phone number) of the
`owner on a display Screen when the mobile phone does
`not start up normally, for example, due to an incorrect
`Security code entry.
`2) Setting the mobile phone in a secure mode where it can
`only be used to call one number. (Emergency calls are
`of course always possible.)
`3) Commanding the mobile phone to send information
`about its location and usage via SMS to a given
`number.
`In order to prevent unauthorized perSons from misusing
`others mobile phones, commands given remotely must
`contain a Security code for the mobile phone. The Security
`code is also needed to open a locked phone.
`When the mobile phone can be set into a secure mode by
`remote control after it has actually been lost, Some of the
`above-mentioned problems can be Solved:
`The mobile phone can be set into a locked mode by
`remote control, when it is still on.
`
`25
`
`35
`
`40
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 6,662,023 B1
`
`3
`information (above all, a phone number other than the
`mobile number) about him/herself. The owner information
`is used to improve the existing Security code concept as
`follows:
`When the mobile phone 10 starts up, the SIM is checked
`first, and a PIN code query is displayed (if PIN query is
`“on”). In case the PIN is successfully entered and the SIM
`is an owner's SIM (known by the mobile phone), the mobile
`phone starts up and can be used normally.
`The improvement of the present invention is that: if the
`PIN query is cancelled, the owner display module 52 dis
`plays on the display module 16 (FIG. 1) of the mobile phone
`10 a phone locked message with owner information shown
`in FIG. 3.
`In an alternative case, another SIM card which is not the
`owner's SIM may be put into the mobile phone 10, and if the
`PIN is entered correctly, then the mobile phone 10 requests
`a Security code. If the Security code is given correctly,
`everything proceeds as usual. But if the Security code query
`is cancelled, or a wrong Security code is given, the mobile
`phone 10 goes into a Secure mode where the owner display
`module 52 displays on the display module 16 (FIG. 1) the
`information shown in FIG. 4.
`In this case, the SIM has been successfully inserted in the
`mobile phone, So it is possible to make a call. However, the
`owner display module 52 of the mobile phone 10 only
`allows a call to the number displayed in the message. The
`call can be made easily via the Softkey on the keyboard
`module 24.
`The owner display module 52 disables any other use of
`the mobile phone 10 (except for emergency calls). This is
`called a Secure mode, which is discussed in more detail
`below.
`The owner information display module 52 may be imple
`mented using hardware, Software or a combination thereof.
`A person skilled in the art would be able to implement the
`owner information display module 52 without undue experi
`mentation.
`
`Remote-controlled Secure Mode
`In FIG. 2, the remote-controlled secure mode module 54
`places the mobile phone 10 in a Secure mode, which is a State
`where the usage of the mobile phone 10 is prohibited, except
`for emergency calls and calls to one other number.
`The mobile phone 10 can go into the secure mode at
`Startup, as described above in relation to the owner infor
`mation display module Section, or it can be Switched into the
`Secure mode by remote control, using a control message,
`while the mobile phone 10 is “on”. The security code of the
`mobile phone 10 is always required in the control message
`to make it valid. (Below, in a section entitled Control
`Messages, the Structure of control messages is discussed in
`more detail.)
`For different situations the user can provide different
`control messages, and display different messages in these
`modes depending on whether the mobile phone 10 is pur
`posely locked for any reason. The mobile phone is typically
`locked because it is lost or Stolen, as follows:
`Lock Phone
`The remote-controlled secure mode module 54 locks the
`mobile phone 10 when the owner sends the control message
`with a lock phone instruction. The mobile phone 10 goes
`into a phone locked State or mode, and a phone locked
`display message shown in FIG. 4 is displayed by the display
`
`4
`module 16 in FIG. 1. The owner number stored in memory
`26 of the mobile phone is used in the phone locked display.
`
`Phone Lost
`
`The remote-controlled secure mode module 54 locks the
`mobile phone 10 when the owner sends the control message
`with a phone lost instruction. The remote-controlled Secure
`mode module 54 locks the mobile phone and displays a
`phone lost display message shown in FIG. 5 on the display
`module 16 in FIG.1. In this case, the mobile phone number
`to be displayed can be sent with the control message, So it
`can be any number the owner finds convenient at the
`moment. If a number is not sent, the number Stored in the
`memory 26 of the mobile phone is used instead. If the
`mobile phone is Switched off and after being put into a phone
`lost mode, the mobile phone starts up as described in the
`previous section, but if the (PIN and) security code is not
`entered correctly, the new contact number will be displayed
`instead of the previously stored one in the message, and
`phone lost text is used instead of the phone locked text.
`
`Phone Stolen
`
`The remote-controlled secure mode module 54 also locks
`the mobile phone 10 when the owner sends the control
`message with a phone Stolen instruction. The remote
`controlled secure mode module 54 will lock the mobile
`phone 10 and display a phone Stolen display message shown
`in FIG. 6 on the display module 16 in FIG. 1. This phone
`State is identical with that of the phone lost message.
`An example of a control language for implementing these
`instructions from the user/owner to the mobile phone 10 are
`discussed in more detail below.
`The remote-controlled secure mode module 54 may be
`implemented using hardware, Software or a combination
`thereof. A person skilled in the art would be able to imple
`ment the remote-controlled secure mode module 54 without
`undue experimentation.
`
`Remote PIN Code
`If the mobile phone 10 is lost, stolen or misplaced the user
`may also Send via a telecommunication Signal a remote PIN
`code command to his/her mobile phone 10 if the need for a
`PIN code has not already been activated by the user. The
`remote-controlled secure mode module 54 will performs
`functions to activate the need for a user to provide a PIN
`code in order to use the mobile phone 10.
`Status Message
`In FIG. 2, the status message module 56 allows the user
`to request information about the mobile phone's Status by
`Sending it the control message with Such a request. The
`mobile phone 10 would return information, for example, via
`a Short Message System (SMS), to a number specified in the
`control message. The information could contain, for
`example, phone location data or last usage data.
`The Status message module 56 may be implemented using
`hardware, Software or a combination thereof. A perSon
`skilled in the art would be able to implement the status
`message module 56 without undue experimentation.
`
`Location Data
`In order to Send location data, the Status message module
`56 cooperates with the position location module 18 to send
`location data indicating the location of the mobile phone 10.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`TABLE 1.
`
`Keyword
`
`Parameter
`
`Description
`
`LOCK
`
`LOST
`
`phone number
`
`Locks the mobile phone,
`displays “Phone is locked
`message and a predefined
`phone number on screen.
`Allows calls to the number.
`Locks the mobile phone,
`(optional) displays a “This
`phone is lost message on
`screen. Allows calling one
`number, specified by the
`mobile phone number
`parameter, or the
`predefined one.
`Locks the mobile phone,
`displays a “This phone is
`stolen' message on screen.
`Allows calling one number,
`specified by the mobile
`phone number parameter, or
`the predefined one.
`Unlocks the mobile phone so
`that it can be used
`normally.
`Commands the mobile phone
`to send a status message to
`the number specified in the
`mobile phone number
`parameter.
`
`STOLEN
`
`phone number
`(optional)
`
`25
`
`UNLOCK
`
`INFO
`
`phone number
`
`S
`The position location module 18 would cooperate with, for
`example, a global positioning Satellite System (not shown),
`to provide Some kind of location information to determine
`the geographical position of the mobile phone.
`
`Last Usage Data
`The Status message module 56 may also Send last usage
`data, Such as when the mobile phone was used the last time
`(call, SMS, or maybe just the use of an application). This
`information is typically stored in the memory of the mobile
`phone 10.
`This is useful in situations where the mobile phone is
`being tracked, for example, if the user does not remember
`where he/she left it. The second item tells whether someone
`has been using it.
`
`1O
`
`15
`
`Control Messages
`In FIG. 2, the security and control module 28 has control
`message modules 50 that include a transfer of control
`messages module 62 and a control language module 64.
`Transfer of Control Messages
`In FIG. 2, the transfer of control messages module 62
`controls the transfer of control messages between the user to
`the mobile phone 10 (FIG. 1).
`The scope of the invention is not intended to be limited to
`any particular way of transferring the control message to the
`mobile phone 10. However, whatever system is used for
`transferring the control message to the mobile phone 10, the
`System must enable the average user to easily Send the
`control message. This means that the user must have an easy
`access to the System which is used to Send the message, and
`the operation for composing and Sending the message must
`also be easy.
`The Short Message System (SMS), which is known in the
`art, provides a natural choice or Scheme for transferring
`control messages, but other message transferring Systems
`are known in the art, including wireleSS internet connections.
`Characteristics of an SMS interface include the following:
`Any mobile phone with SMS capability can be used to
`Send the control message.
`The receiving mobile phone can receive the control
`message automatically whenever it is “on” and in contact
`with a network.
`The transfer of control messages module 62 may be
`implemented using hardware, Software or a combination
`thereof. A person skilled in the art would be able to imple
`ment the transfer of control messages module 62 without
`undue experimentation.
`Control Language
`In FIG. 2, the control language module 64 operates to
`control the language used to transfer messages between the
`user to the mobile phone 10 (FIG. 1). The control language
`is implemented for composing control messages. The con
`trol language is a simple one and resembles a natural
`language in order to make it easy to memorize.
`The following is an example of a simple control language
`that may be used:
`Commands and parameters are Separated by nonprinting
`characters (space, new line etc.).
`A command starts with the keyword SECURITY fol
`lowed by the security code of the mobile phone. When a
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,662,023 B1
`
`6
`Short message arrives, the control language module 64
`always checks the beginning of the control message, and if
`a keyword with matching Security code is found, it interprets
`the whole message and acts accordingly.
`After the beginning keyword and Security code, one
`command keyword (and its parameter if required) can be
`added. Examples of Supported commands and a description
`thereof are listed in Table 1 as follows:
`
`AS an example, a command message containing the text
`“SECURITY 12345 LOST 02654321 would instruct the
`control language module 64 to display the lost phone
`message, to lock the mobile phone, and to allow calls to the
`phone number 02654321.
`The control language module 64 may be implemented
`using hardware, Software or a combination thereof. A perSon
`skilled in the art would be able to implement the control
`language module 64 without undue experimentation.
`In one embodiment, the control messages would only be
`effective when the mobile phone 10 (FIG. 1) uses the
`owner's SIM. Therefore, other existing security mechanisms
`would be needed to achieve the best security.
`The present invention improves current Security Schemes,
`for example, in the usual case when a mobile phone is lost
`when it is “on”, So that anyone can use it until power runs
`out or the operator blocks it. The present invention can also
`help in those cases where the PIN query is off, although the
`SIM can then be used in other phones.
`Scope of the Invention
`Accordingly, the invention comprises the features of
`construction, combination of elements, and arrangement of
`parts which will be exemplified in the construction herein
`after set forth.
`It will thus be seen that the objects set forth above, and
`those made apparent from the preceding description, are
`efficiently attained and, Since certain changes may be made
`in the above construction without departing from the Scope
`of the invention, it is intended that all matter contained in the
`
`
`
`7
`above description or shown in the accompanying drawing
`shall be interpreted as illustrative and not in a limiting Sense.
`I claim:
`1. A method of displaying owner information for Security
`applications in a Secure mode operation of a mobile phone,
`comprising the Steps of:
`checking a SIM card;
`displaying a PIN code query if the PIN code query is “on”,
`receiving a user PIN code, and checking the PIN code;
`and
`either Starting up the mobile phone So a user can operate
`the mobile phone normally if the SIM card is recog
`nized as a mobile phone owner's SIM card known by
`the mobile phone and if the PIN code is successfully
`entered, or
`locking the mobile phone and displaying a phone display
`message with owner information if the code PIN query
`is cancelled.
`2. A method according to claim 1, wherein the method
`further comprises the Steps of
`requesting a Security code from the user if the SIM card
`is not recognized as a mobile phone owner's SIM card
`known by the mobile phone, and the PIN code is
`entered correctly, and checking the Security code; and
`either starting up the mobile phone So the user can operate
`the mobile phone normally if the Security code is
`entered correctly, or
`locking the mobile phone and displaying the phone dis
`play message with owner information if a Security code
`request is cancelled, or if a wrong Security code is
`given.
`3. A method according to claim 1, wherein the Step of
`locking the mobile phone comprises the Steps of:
`only allowing a phone call to an owner's phone number
`displayed in the phone display message, and disabling
`any other use of the mobile phone, except for emer
`gency calls.
`4. A method according to claim 3, wherein the method
`includes requesting the owner information from the user and
`Storing the owner information in the memory.
`5. A method according to claim 1, wherein the method
`further comprises the Steps of
`receiving a control message via a telecommunications
`Signal from an owner of the mobile phone with a phone
`lost command for locking the mobile phone and dis
`playing the phone display message.
`6. A method according to claim 5, wherein the phone
`display message includes a phone locked display message
`containing the text “Phone is locked. Call the owner.”, as
`well as an owner's telephone number Stored in a memory of
`the mobile phone.
`7. A method according to claim 5, wherein the control
`message includes an owner telephone number for displaying
`in the phone display message to reach the owner of the
`mobile phone.
`8. A method according to claim 5, wherein the phone
`display message includes a phone lost display message
`containing the text “This phone is lost. Call the owner.”, and
`an owner's telephone number that is provided in the control
`meSSage.
`9. A method according to claim 5, wherein the method
`includes the Steps of:
`Switching the mobile phone off, and
`either restarting the mobile phone So the user can operate
`the mobile phone normally if the PIN code and security
`code are entered correctly, or
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,662,023 B1
`
`8
`locking the mobile phone if the PIN code and security
`code are not entered correctly, and displaying the phone
`display message as a phone lost display message con
`taining the text “This phone is lost. Call the owner.”,
`and an owner's telephone number that is provided in
`the control message.
`10. A method according to claim 5, wherein the phone
`display message includes a phone lost display message
`containing the text “This phone is stolen. Call the owner.”,
`and an owner's telephone number that is either Stored in a
`memory of the mobile phone or provided in the control
`meSSage.
`11. A method according to claim 5, wherein the method
`includes the Step of
`transferring the control message from the user using a
`short message System.
`12. A method according to claim 11, wherein the Step of
`transferring includes Sending the control message with any
`mobile phone having the short message System.
`13. A method according to claim 11, wherein the method
`includes the Step of
`enabling the mobile phone to automatically receive the
`control message when the mobile phone is “on” and in
`contact with the network.
`14. A method according to claim 5, wherein the method
`includes the Step of
`using a control language for Sending the control messages
`to the mobile phone that has commands and parameters
`Separated by nonprinting characters.
`15. A method according to claim 5, wherein the method
`includes the Step of
`using a control language for Sending the control message
`to the mobile phone that Starts with a command having
`a keyword SECURITY followed by the security code
`of the mobile phone.
`16. A method according to claim 5, wherein the method
`includes the Steps of:
`receiving a short message that is a part of the control
`message, and
`checking the mobile phone at the beginning of the short
`message, and if a keyword with a matching Security
`code is found, then interpreting the control message
`and adapting the mobile phone accordingly.
`17. A method according to claim 1, wherein the method
`further comprises the Steps of
`receiving a phone Status request from a remote Source;
`and
`providing a Status message with information about the
`mobile phone in response thereto.
`18. A method according to claim 17, wherein the phone
`Status request includes a phone number to which the Status
`message is to be sent.
`19. A method according to claim 17, wherein the status
`message includes information about a position location of
`the mobile phone.
`20. A method according to claim 17, wherein the status
`message includes information about usage of the mobile
`phone, including data about a last usage.
`21. A method according to claim 1, wherein the method
`includes Storing owner information in a memory of the
`mobile phone.
`22. A method according to claim 1, wherein the phone
`display message is a phone locked display message contain
`ing the text “Phone is locked. Call the owner.”, and the
`owner's telephone number.
`23. A method for locking a mobile phone, comprising the
`Steps of
`
`
`
`US 6,662,023 B1
`
`receiving either a user Security input Signal and a personal
`identification input Signal, or a telecommunication con
`trol Signal, or a combination thereof, the telecommu
`nication signal being a remote owner Status request
`message Signal via a telecommunication network from
`an owner of the mobile phone requesting Status infor
`mation;
`locking the mobile phone in response thereto, and
`providing a status message Signal via the telecommuni
`cations network to the owner with information about
`the mobile phone.
`24. A method according to claim 23, wherein the user
`Security input signal is either a SIM card Signal or a Security
`control Signal, and the personal identification input signal is
`a PIN code signal.
`25. A method according to claim 23, wherein the tele
`communication control signal is a remote control message
`Signal via a telecommunications network from an owner of
`the mobile phone.
`26. A method according to claim 23, wherein the method
`includes the Step of displaying a phone display message with
`owner information for contacting the owner of the mobile
`phone.
`27. A method according to claim 26, wherein the method
`includes the Step of displaying a phone locked display
`message with the text: “This phone is locked. Call the
`owner.”, as well as the phone number of the owner of the
`mobile phone.
`28. A method according to claim 26, wherein the method
`includes the Step of displaying a phone lost display message
`with the text: “This phone is lost. Call the owner.”, as well
`as the phone number of the owner of the mobile phone.
`29. A method according to claim 26, wherein the method
`includes the step of displaying a phone stolen display
`message with the text: “This phone is stolen. Call the
`owner.”, as well as the phone number of the owner of the
`mobile phone.
`30. A method according to claim 23, wherein the remote
`phone message Signal includes a phone number from the
`owner to which the Status message Signal should be sent.
`31. A method according to claim 23, wherein the Status
`message Signal includes information about a position loca
`tion of the mobile phone.
`32. A method according to claim 23, wherein the Status
`message Signal includes information about usage of the
`mobile phone, including data about last usage.
`33. A method according to claim 23, wherein the method
`includes the Step of
`transferring the telecommunication control Signal from
`the owner using a short message System.
`34. A mobile phone for communicating in a telecommu
`nications network, the mobile phone comprising:
`Security and control modules, responsive to either a user
`Security input signal and a personal identification input
`Signal, or a telecommunication control Signal, or a
`combination thereof, for locking the mobile phone in
`response thereto, the Security and control modules
`including a status message module that receives the
`telecommunication control Signal in the form of a
`remote owner Status request message Signal from an
`owner of the mobile phone requesting Status
`information, for providing a status message telecom
`munication signal to the owner with information about
`the mobile phone.
`35. A mobile phone according to claim 34, wherein the
`user Security input signal is either a SIM card Signal or a
`Security control Signal, and the personal identification input
`Signal is a PIN code signal.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`10
`36. A mobile phone according to claim 34, wherein the
`Security and control modules include a remote-controlled
`Secure mode module that receives the telecommunication
`control Signal in the form of a remote control message Signal
`via a telecommunications network from an owner of the
`mobile phone.
`37. A mobile phone according to claim 34, wherein the
`Security and control modules include an owner information
`display that displays a phone display message with owner
`information for contacting the owner of the mobile phone.
`38. A mobile phone according to claim 37, wherein the
`owner information display includes a phone locked display
`message with the text: “This phone is locked. Call the
`owner.”, as well as the phone number of the owner of the
`mobile phone.
`39. A mobile phone according t