website statistics

What new Apple device you are getting?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Mobile devices run a very high risk of being stolen, due to their size and the sheer ease with which they can be stolen. Apple has been trying to effectively counter the dislocation of its devices, helping customer recover them. Now, a new Apple patent application indicates that Apple may be working on a some more advanced tools to this end.

The patent application titled ‘Proactive Security for Mobile Devices’ has been credited to Apple engineer Hooman Borghei. According to this application, a number of new security methods have been explored that may be used in case of such mobile devices which are stolen or lost.

For instance, if a culprit enters the wrong passcode on a user’s lost mobile device, a certain mechanism comes into effect which selectively protects the data on the device. Moreover, a number of remote surveillance capabilities are also being discussed.

For instance, the application talks about transmitting the images and sounds from your device secretly after it is being stolen. This may help identify the culprit who stole the device.

According to the application, “A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server.”

In a way, Apple is probably attempting to make the security mechanism of a stolen device more ‘intelligent’ to make it realize that it is no longer in the hands of its rightful owner. The application further states, “If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.”

Maybe they will use this in “Find My iPhone” application in future.

Source: USPTO

Courtesy: 9to5mac

OCZ Announces Agility 4 Series SSD With Prices Starting At $150

LG Launched 13.3 Inch X Note Z350 Laptop With 3rd Gen Intel Processor
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 3, 2012(3 years, 4 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook