It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
* The system can take a picture of the user's face, "without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed";
* The system can record the user's voice, whether or not a phone call is even being made;
* The system can determine the user's unique individual heartbeat "signature";
* To determine if the device has been hacked, the device can watch for "a sudden increase in memory usage of the electronic device";
* The user's "Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded"; and
FIELD OF THE INVENTION
[0001]This relates to systems and methods for identifying unauthorized users of an electronic device. In particular, this relates to systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device.
BACKGROUND OF THE INVENTION
[0002]People often possess and carry around a variety of electronic devices, such as, for example, cellular phones, PDA's, personal e-mail or messaging devices (e.g., a Blackberry.TM.), and handheld media players (e.g., an iPod.TM.). Many of these electronic devices are used frequently by their owners, and the electronic devices may contain personal or sensitive information stored within them. For example, the electronic devices may contain information such as credit card numbers, passwords, social security numbers, bank information, contact lists, or calendar information. Accordingly, if the electronic device is lost or stolen, the loss of the electronic device can be exceedingly disruptive to the owner's peace of mind and security. Thus, the owner may desire to find out where the lost electronic device is located or who may have gained possession of or stolen the electronic device.
SUMMARY OF THE INVENTION
[0003]Systems and methods for identifying unauthorized users of an electronic device are provided. In particular, systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device are provided.
[0004]In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device. For example, a photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above. The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match. If they do not match, the current user can be detected as an unauthorized user.
12. The electronic device of claim 11, further comprising:a microphone operable to record the voice of the current user; andwherein the processor is further operable to:compare the recorded voice with voice prints of authorized user of the electronic device; anddetermine that the recorded voice does not match the voice print of any authorized user of the electronic device.
13. The electronic device of claim 11, further comprising:a heartbeat sensor operable to detect the heartbeat of the current user; andwherein the processor is further operable to:compare the detected heartbeat with heart signatures of each authorized user of the electronic device; anddetermine that detected the heartbeat does not match the heart signature of any authorized user of the electronic device.
15. The electronic device of claim 11, further comprising:a camera operable to take a photograph of the vicinity of the electronic device; andpositioning circuitry operable to determine current location information of the electronic device; andwherein the processor is further operable to:geotag the photograph by associating the photograph with the current location information.
16. The electronic device of claim 11, further comprising:an accelerometer operable to record a vibration profile of the electronic device; anda signal processor operable to compare the recorded vibration profile with a library of vibration profiles to determine a current mode of transportation of the electronic device.
18. The system of claim 17, wherein:the camera is operable to take a plurality of photographs of the surroundings of the electronic device; andwherein the processor is further operable to:analyze each of the plurality of photographs to identify distinguishing landmarks in the photographs; anddetermine the location of each photograph based on the identified distinguishing landmarks.
Originally posted by truthquest
reply to post by ShadowKingpin
Here is the part of the actual text of the patent application directly from the US Patent & Trademark Office:
FIELD OF THE INVENTION
[0001]This relates to systems and methods for identifying unauthorized users of an electronic device. In particular, this relates to systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device.
BACKGROUND OF THE INVENTION
[0002]People often possess and carry around a variety of electronic devices, such as, for example, cellular phones, PDA's, personal e-mail or messaging devices (e.g., a Blackberry.TM.), and handheld media players (e.g., an iPod.TM.). Many of these electronic devices are used frequently by their owners, and the electronic devices may contain personal or sensitive information stored within them. For example, the electronic devices may contain information such as credit card numbers, passwords, social security numbers, bank information, contact lists, or calendar information. Accordingly, if the electronic device is lost or stolen, the loss of the electronic device can be exceedingly disruptive to the owner's peace of mind and security. Thus, the owner may desire to find out where the lost electronic device is located or who may have gained possession of or stolen the electronic device.
SUMMARY OF THE INVENTION
[0003]Systems and methods for identifying unauthorized users of an electronic device are provided. In particular, systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device are provided.
[0004]In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device. For example, a photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above. The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match. If they do not match, the current user can be detected as an unauthorized user.
Source: appft.uspto.gov... 1&OS=20100207721&RS=20100207721
Apple is clearly marketing this idea as a way to capture thieves, and I have no doubt it may be pretty useful for doing that. But of course it conveniently can double as quite a way to spy on an incredibly large number of people without their permission.
[edit on 24-8-2010 by truthquest]