Detection of lost status of mobile devices

Similar documents
Automatic information protection when device camera is operated by secondary user

Voice activated spell-check

Context based automatic responses

Disabling facial unlocking using facial expression

Handwriting recognition for IDEs with Unicode support

Ranking trip search results based on user travel history

Summarizing Existing Conversation For Newly Added Participants In Online Communication

Technical Disclosure Commons

Technical Disclosure Commons

Intelligent ranking for photo galleries using sharing intent

Providing link suggestions based on recent user activity

TEMPORAL/SPATIAL CALENDAR EVENTS AND TRIGGERS

Seamless transfer of ambient media from environment to mobile device

Reporting road hazards using in-vehicle camera

Group Targeting for Video Ads Based on Location Context

Polite mode for a virtual assistant

Technical Disclosure Commons

PRE-ARRIVAL DESTINATION PREPARATION

Automatic event scheduling based on weather conditions

BUFFERING AND INSERTING TEXT INPUTS

Conversion of a 3D scene into video

Prediction and Selection of Sequence of Actions Related to Voice Activated Computing Systems

An Eye Tracking System For Smart Devices

SOCIAL NETWORK BASED AUTHENTICATION FOR SECURE ACCESS

Secure web proxy resistant to probing attacks

CarLink Guide for Android Users

TIMING-BASED ASSISTANT CONTROLS

New Account Creation. 2. Launch the CarLink app. from your phone s application list. 3. Enter a name for the vehicle.

Notification Features For Digital Content In A Mobile-Optimized Format

ALLOCATING RF SPECTRUM PARTITIONS IN A CBRS NETWORK

Displaying web pages within a software keyboard

WEB SITE USERS GUIDE. Manual Contents

On-Device troubleshooting for conferencing and enterprise equipment

Artificial Intelligence Powered Brand Identification and Attribution for On Screen Content

VOICE AND TOUCH BASED INPUT

Vehicle To Android Communication Mode

TIME DILATION CONTROLS FOR CAMERAS

ASCL1 / ASCL2 CarLink Guide for Android Users

SYSTEM AND METHOD FOR SPEECH RECOGNITION

Replay Real World Network Conditions To Test Cellular Switching

ALTERNATIVE CHARGE CONTROL SYSTEM FOR MERCHANDISE DISPLAY SECURITY SYSTEM

HIPAA and HIPAA Compliance with PHI/PII in Research

Control of jitter buffer size using machine learning

IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE

Selecting native ad units using gestures

IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL ANALYSIS

EFFICIENT TRAINING FOR MACHINE LEARNING MODELS ON EMBEDDED AND/OR LOW-POWER DEVICES

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Synchronizing Media Content In A Shared Virtual Reality Environment

Organization information. When you create an organization on icentrex, we collect your address (as the Organization Owner), your

AT&T Global Network Client for Android

Actions on Landing Pages

CONNECTED CAR TECHNOLOGY

7 The system should allow administrator to close a user profile. 8 The system shall make the old events invisible to avoid crowded geo scope.

REDUCING GRANULARITY OF BROWSER FINGERPRINTING TECHNIQUES

Advanced Intrusion Detection

About MassMutual Electronic Bill Presentment & Payment

SIMSme Management Cockpit Documentation

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps

This guide describes features that are common to most models. Some features may not be available on your tablet.

ASCL1 / ASCL2. CarLink Guide for BlackBerry Users Audiovox Electronics Corporation. All rights reserved.

Chronos Fitness, Inc. dba Chronos Wearables, 1347 Green St. San Francisco CA 94109,

Eagles Charitable Foundation Privacy Policy

Method Of Password Entering And Storing

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

DYNAMICALLY CACHING VIDEO CONTENT BASED ON USER LIKELIHOOD OF INTERACTING WITH CONTENT ELEMENT

Privacy Policy. I. How your information is used. Registration and account information. March 3,

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

EngiBOX system User Manual

ADAPTIVE USER INTERFACE BASED ON EYE TRACKING

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Security. ITM Platform

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

.io. How to use WeAlert.io in your neighbourhood QUICK GUIDE WEALERT-APP

Best Practices Guide to Electronic Banking

Data Compromise Notice Procedure Summary and Guide

Certification Authority

LBI Public Information. Please consider the impact to the environment before printing this.

Bluetooth Lock Boxes User Guide

C O N TA C T !!!!!! Portfolio Summary. for more information July, 2014

SSD Admission Control for Content Delivery Networks

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

Competitor Identification Based On Organic Impressions

HIPAA Regulatory Compliance

2. What is Personal Information and Non-Personally Identifiable Information?

Input And Output Method Of Personalized Answers With Chatbot

Privacy Statement for DROP Connect Products and Services

MULTIPLE TIER LOW OVERHEAD MEMORY LEAK DETECTOR

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

Quick Setup Guide. Tip: We recommend you use a Vodafone SIM card. SIM cards from other networks might not work!

Mobile Security using IBM Endpoint Manager Mobile Device Management

LCNB National Bank mymobilemoneyaccess Quick Reference Guide. Getting Set Up

10 Hidden IT Risks That Might Threaten Your Business

TaxiMe Privacy Policy for Passengers

BlackBerry AtHoc Networked Crisis Communication. Self Service User Guide

Frequently Asked Questions (FAQ)

CardValet. Where can CardValet be downloaded? The CardValet application is available on the Apple App Store and Google Play Store.

SMART LIVE CHAT LIMITER

Transcription:

Technical Disclosure Commons Defensive Publications Series November 22, 2017 Detection of lost status of mobile devices Sandro Feuz Victor Carbune Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended Citation Feuz, Sandro and Carbune, Victor, "Detection of lost status of mobile devices", Technical Disclosure Commons, (November 22, 2017) This work is licensed under a Creative Commons Attribution 4.0 License. This Article is brought to you for free and open access by Technical Disclosure Commons. It has been accepted for inclusion in Defensive Publications Series by an authorized administrator of Technical Disclosure Commons.

Feuz and Carbune: Detection of lost status of mobile devices Detection of lost status of mobile devices ABSTRACT Users often forget or misplace mobile devices, e.g., smartphones. To find or recover such devices, users can utilize find my device features, if available on the device, cause the device to emit a sound, etc. However, no mechanisms exist for a device to automatically detect that it is lost or about to be lost. Per techniques described herein, an on-device predictor determines that a device is lost (separated from the owner) or is about to be lost. The prediction is based on various factors, including device sensor data, recent use of apps, recent user context, etc. for which the user has provided access. If it is determined that the device is lost, various mitigating actions as permitted by the user are performed. For example, such actions include sending notifications to other devices of the same user, initiating communicating with the user or a trusted contact, locking the device, encrypting user data, disabling notifications, etc. KEYWORDS Lost phone Phone recovery Find my device Unauthorized access Device security BACKGROUND Users sometimes forget or lose mobile devices, e.g., smartphones, tablets, etc. In such situations, users employ various methods to try to locate the misplaced device. For example, users attempt to call a lost phone from another device. Some devices have built-in find my device features that users can employ to locate the misplaced device, or to disable access to the Published by Technical Disclosure Commons, 2017 2

Defensive Publications Series, Art. 826 [2017] device. There are also mobile apps that enable device recovery. However, these approaches require users to initiate action. These approaches do not work, e.g., if the device is on mute, lacks internet connectivity, has location sensors turned off, etc. DESCRIPTION Techniques described use on-device machine learning models to determine whether a device is likely to be lost, or has been lost. Based on the determination, the device is configured to perform actions to notify the device owner of the lost device location. The models determine various mechanisms to reach the owner. For example, the actions to notify the device owner include notifying a nearby different device, e.g., another device of the user, a trusted friend s nearby device, etc. of the location and status of the lost device; automatically ringing the lost device; and displaying notifications on the device lock screen, e.g., that include contact information of the device owner, a nearby lost and found office, etc. to facilitate identification of the owner and return of the device to the owner. Fig. 1 Notification and alerts are provided based on evaluation of contextual factors, upon permission for the user to access and use such factors. The user can select specific factors that 3

Feuz and Carbune: Detection of lost status of mobile devices can be used for lost device prediction and can choose to deny permission or disable lost device prediction. Fig. 1 illustrates a scenario where a phone belonging to a user Bob (102) observes sensor data (108) and user activity data (110), as permitted by the user, to determine via a prediction module (106) whether it is lost. In this scenario, the prediction module utilizes an on-device machine learning model. Alternatively, or in addition, rule-based heuristics can also be used for such prediction. The model is run periodically to determine whether a device has been lost, or is likely to be lost. When the prediction module determines a lost phone condition, it updates or instructs the phone operating system to update the phone settings to lock the phone and display an alert (104). For example, the alert can include an address to which the phone can be returned and/or an alternate contact number for the user. Further, the lost phone is also configured to transmit its location and status (112) to the user s other devices (116), e.g., as notifications, to the user s email account (118), and to the user s trusted contacts (120). The device can also be configured to take actions to automatically secure user data upon determination that the device is likely lost. Such actions ensure that private data is not subject to unauthorized access. For example, if the lost device is in an unfamiliar location or a public location (e.g., on a train, in a taxi, etc.), such actions can include automatically locking the device and encrypting user data. In this situation, the user data is made accessible only with second-factor authentication. Further, personal notifications are removed and the device lockscreen is configured to omit private and confidential content. Alternatively, based on predetermined context information, it may be inferred that the device was intentionally left at a location. The model takes as inputs contextual data permitted by the user, e.g., sensor values from various on-device sensors, app status, recent user actions, e.g., Published by Technical Disclosure Commons, 2017 4

Defensive Publications Series, Art. 826 [2017] screen state and touch events, and information about nearby devices that belong to the same user. Such data is accessed only with prior user permission and express consent, and to conserve the battery, is obtained periodically. The model can be implemented as multiple blocks of neural networks, e.g., one for each input signal. The model provides a confidence score as the output. For example, a high confidence score is an indication that the device is lost. A medium score indicates that the device is lost, but in a familiar or secure location such as the user s home, office, personal vehicle, etc. Other traditional, non-neural network models can also be used for prediction. A high confidence score triggers an alert the device owner of the lost device status and its current location. The techniques determine one or more paths to alert the owner of the lost device location. The paths can be identified based on available data such as other devices of the owner located nearby, trusted contacts of the owner or devices of trusted contacts, and nature of the device location, e.g., familiar/secure location and unfamiliar/public location. For example, a lost device automatically notifies other nearby devices owned by the user of the lost device status and location. Also, this information is communicated to the user s preferred messaging or email account. The user can reply to a message with a known emergency code, and the device can respond with its current location. Such actions can be extended, with user permission and express consent, to respective devices and/or email/messaging accounts of the user s trusted contacts. For example, such communication can be limited to trusted contacts travelling or residing with the user (identified based on the context). For example, a phone forgotten on a train can send a message to the phone or to the email account of the owner s trusted friend traveling on the same train stating that the owner has forgotten the phone and include in that message the location of the lost phone. When the model determines, based on the 5

Feuz and Carbune: Detection of lost status of mobile devices context, that the device is likely to be lost, the device is caused to ring. For example, such activation can occur when the owner is about to exit a train, taxi, etc. The present techniques enable a device to determine a lost condition and automatically activate various mechanisms to contact the user and/or take other actions. The techniques can be implemented as part of device operating systems and/or applications. The techniques are suitable for portable devices, including mobile phones, tablets, PCs, and other internet-connected devices. Further to the descriptions above, a user may be provided with controls allowing the user to make an election as to both if and when systems, programs or features described herein may enable collection of user information (e.g., information about a user s social network, social actions or activities, profession, a user s preferences, or a user s current location), and if the user is sent content or communications from a server. In addition, certain data may be treated in one or more ways before it is stored or used, so that personally identifiable information is removed. For example, a user s identity may be treated so that no personally identifiable information can be determined for the user, or a user s geographic location may be generalized where location information is obtained (such as to a city, ZIP code, or state level), so that a particular location of a user cannot be determined. Thus, the user may have control over what information is collected about the user, how that information is used, and what information is provided to the user. CONCLUSION An on-device predictor determines that a device is lost (separated from the owner) or is about to be lost. The prediction is based on various factors, including device sensor data, recent use of apps, recent user context, etc. for which the user has provided access. An on device trained machine learning model is deployed to generate a confidence score based on the factors. Based on the confidence score, if it is determined that the device is lost, various mitigating Published by Technical Disclosure Commons, 2017 6

Defensive Publications Series, Art. 826 [2017] actions as permitted by the user are performed. For example, such actions include sending notifications to other devices of the same user, initiating communicating with the user or a trusted contact, locking the device, encrypting user data, disabling notifications, etc. 7