There is always one fear if you are the owner of a smart phone, the fear of losing it or it being stolen. At such times, your smart phone is in trouble, obviously, but along with it, all your personal information, your contacts, your emails, and other data are also in danger, if the person having your smart phone finds a way to unlock it. So the very first thing you should do is employ some kind of a locking mechanism. A pin code, a pattern, face detection, or any other method suitable. But still, there will be ways to access your personal data.
So technologies which help users of smart phone in remotely locating their smart phones and remotely wiping the data on the smart phone are becoming very important. And now, on Tuesday, Apple got granted a set of patents, and one among those patents is a new technology which is focused on detecting and alerting the owner of a smart phone when his iPhone is lost or stolen. Apple Insider writes:
Among the flurry of patents granted to Apple on Tuesday, an interesting invention regarding iPhone security was discovered, with the property describing various methods to protect sensitive data if an unauthorized user tries to access gets hold of the device.
U.S. Patent No. 8,289,130 for “Systems and methods for identifying unauthorized users of an electronic device” offers a unique security solution to the ever-present problem of having one’s iPhone stolen or lost.
The patent’s innocuous language starts out by saying, “This is generally directed to identifying unauthorized users of an electronic device,” but goes far beyond any identification technology currently available in Apple’s handset. For example, one embodiment of the invention calls for heartbeat monitoring, which can be used to determine whether the person holding an iPhone is the owner.
An abstract from the patent says:
In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken.
Source: Apple Insider