Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM AND A METHOD FOR LOCKING A LOST PORTABLE COMMUNICATION DEVICE
Document Type and Number:
WIPO Patent Application WO/2018/047203
Kind Code:
A1
Abstract:
A system and a method for providing data security and locking a lost portable communication device is disclosed. The method initiates a short media message (SMS) including a lock command that directly communicates with the IMEI number of the portable communication device. The lock command restricts the functionality of the device. The system provides data security and prevents an unauthorized user from flashing the portable communication device. The system for locking portable communication device includes an IMEI module, a security module, a server and a GSM module.

Inventors:
RATHI ROHIT (IN)
Application Number:
PCT/IN2017/050391
Publication Date:
March 15, 2018
Filing Date:
September 09, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SMARTRON INDIA PRIVATE LTD (IN)
International Classes:
H04W12/08; H04M1/66
Foreign References:
US20100151822A12010-06-17
US20140032691A12014-01-30
Attorney, Agent or Firm:
PRABHU, Rakesh (IN)
Download PDF:
Claims:
CLAIMS:

What is claimed is:

1. A method for providing data security in a portable communication device, the method comprising:

installing a security module under an operating system of the mobile device operating system, wherein the security module communicates with a hardware processor coupled to a memory containing instructions configured for implementing locking function; enabling a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command; sending a onetime password (OTP) on the registered mobile device to authenticate the user activating a biometric scanner on initiating a flash request on the portable communication device, wherein the biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access; initiating a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM, wherein the trigger message comprises a lock request confirmation and a location information of the portable communication device; sending a one-time password to the registered mobile number when the trigger message is initiated to authenticate the user; and initiating a locking of the portable communication device when a SIM is replaced or biometric authentication fails, wherein locking of the portable communication device provides data security;

wherein a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

2. The method as claimed in claim 1, wherein the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command.

3. The method as claimed in claim 1, wherein the lock command restricts the functionality of the device.

4. The method as claimed in claim 1, wherein the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification.

5. The method as claimed in claim 1, wherein the step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success.

6. The method as claimed in claim 1, wherein the step of enabling a user to initiate a message further comprises

sending a request to a server with contact details and password corresponding to the portable communication device;

identifying the portable communication device associated with the contact details;

sending the message from the server to the identified portable communication device.

7. The method as claimed in claim 1, wherein the location information is a GPS location of the device.

8. A system for providing data security in a portable communication device, the system comprising:

a security module installed under an operating system of the mobile device operating system, wherein the security module communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function, wherein the security module is configured to: enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command;

send a one-time password to the registered mobile number when the trigger message is initiated to authenticate the user; and

activate a biometric scanner on initiating a flash request on the portable communication device, wherein the biometric scanner authenticates a user accessing the portable communication device and prevent unauthorised access; initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM, wherein the trigger message comprises a lock request confirmation and a location information of the portable communication device;

send a one-time password to the registered mobile number when the trigger message is initiated to authenticate the user; and

initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails;

wherein a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

9. The system as claimed in claim 8, further comprises a IMEI module configured to receive message that directly communicates with the IMEI number of the portable communication device.

10. The system as claimed in claim 8, wherein the lock command restricts the functionality of the device.

11. The system as claimed in claim 8, further comprises a biometric scanner configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification.

12. The system as claimed in claim 8, further comprises a Global Positioning system or GPS module for determining location information.

Description:
A SYSTEM AND A METHOD FOR LOCKING A LOST PORTABLE

COMMUNICATION DEVICE

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This patent application claims the priority of the Indian Provisional Patent Application filed on March 10, 2016 and subsequently Post-dated by 6 months to September 10, 2016 with the number 201641008329 and titled, "SYSTEM AND METHOD FOR LOCKING A LOST PORTABLE COMMUNICATION DEVICE THROUGH SMS", and also claims the priority of another Indian Provisional Patent Application filed on March 14, 2016 and subsequently Post-dated by 6 months to September 14, 2016 with the number 201641008754 and titled, "SYSTEM AND METHOD FOR LOCKING A STOLEN PORTABLE COMMUNICATION DEVICE" and also the contents of which are incorporated herein by the way of reference.

BACKGROUND

Technical Field

[0002] The embodiment herein is generally related to the field of mobile communication devices. The embodiment herein is particularly related to a system and method for preventing misuse of lost portable communication device by an unauthorized user. The embodiment herein is more particularly related to a system and method for sending a message to lock a lost (misplaced or stolen) portable communication device.

Description of the Related Art

[0003] As communication using mobile phones increased extensively, the problem of mobile phone safety has become crucial. Currently, the mobile phone devices contain an electronic module known as subscriber identity module (SIM). Further, the mobile device is identified using an equipment identifier known as internal mobile equipment identity (IMEI).

[0004] Each mobile communication device carries a unique device-id (device identification) which is known as International Mobile Equipment Identity (IMEI) in Global System for Mobile Communications (GSM). This device-id can be used by a network service provider to trace/track the mobile communication device and to block the mobile communication device, if the mobile communication device is stolen and reused by somebody else. GSM network architecture has a node defined in the network called Equipment Identification Register (EIR), which maintains a list of black listed, white listed and grey listed mobile communication devices.

[0005] The existing methods involves in blocking the IMEI number by communicating with a network provider. The method is deployed to track the IMEI of the devices under service in a network and further map the IMEI with a database of stolen devices. This method is strenuous and does not provide sufficient protection.

[0006] In CDMA systems, the users typically block the SIM once the mobile phone is lost. However, an unauthorized user can flash the mobile phone and use the same with a different carrier. Hackers can change the IMEI of the mobile phones. There are no system to block the functionality of the mobile phone once the mobile device is lost. Further, there are no systems that directly communicate with the IMEI of the lost mobile phone.

[0007] In view of the above discussion, there exists a need for a system and method to lock a portable communication device incase of loss and provide data security. Further, there exists need for a method and system for preventing the use of the portable communication device by replacing existing SIM. Furthermore, there exists need for a method for preventing the use of the portable communication device by flashing.

[0008] The above-mentioned shortcomings, disadvantages and problems are addressed herein, which will be understood by reading and studying the following specification.

OBIECTS OF THE EMBODIMENTS

[0009] The primary object of the embodiment herein is to provide a system and method for data security in a portable communication device by providing options for locking the device.

[0010] Another object of the embodiment herein is to provide a system and method for enabling a biometric scanner to prevent an unauthorized user from flashing the portable communication device.

[0011] Yet another object of the embodiment herein is to provide a method and system for initiating a trigger message including locking request and device location, when an attempt is made to replace existing SIM (Subscriber Identity Module), thereby preventing misuse of the device.

[0012] Yet another object of the embodiment herein is to provide a method and system for initiating a locking of a stolen or lost portable communication device when a SIM is replaced or biometric authentication fails.

[0013] Yet another object of the embodiment herein is to provide a method and system for locking a lost portable communication device by sending a short media message (SMS). [0014] Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by a message that directly communicates with the IMEI number.

[0015] Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by sending a short media message with lock command.

[0016] Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by initiating a trigger message from the lost communication device to a registered mobile number with a location information and a lock request.

[0017] These and other objects and advantages of the embodiment herein will become readily apparent from the following detailed description taken in conjunction with the accompanying drawings.

SUMMARY

[0018] The various embodiments of the embodiment herein disclose a system and method for immediately locking a lost portable communication device by sending a short media service (SMS). The SMS initiates a lock command that directly communicates with the IMEI number of the portable communication device.

[0019] According to an embodiment herein, a method for providing data security in a portable communication device is disclosed. A security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function. A user is enabled to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, a biometric scanner is activated on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access. A trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM. The trigger message comprises a lock request confirmation and a location information of the portable communication device. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated. Further, a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails. Thus, locking of the portable communication device provides data security.

[0020] According to an embodiment herein, the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command. The lock command restricts the functionality of the device.

[0021] According to an embodiment herein, the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification. The step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success. The step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device.

[0022] According to an embodiment herein, the location information is a GPS location of the device provided by the GPS module.

[0023] According to an embodiment herein, the system for providing data security in a portable communication device comprises an IMEI module, a biometric scanner, a security module, and a GSM module. The security module is installed under an operating system of the mobile device operating system. The security module communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function. The security module is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, the security module is configured to activate a biometric scanner on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access. The security module is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM. The trigger message comprises a lock request confirmation and a location information of the portable communication device. The security module is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0024] According to an embodiment herein, the system further comprises a IMEI module configured to receive message that directly communicates with the IMEI number of the portable communication device. The lock command restricts the functionality of the device. The system further comprises a biometric scanner configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification. The system includes a Global Positioning system or GPS module for determining location information.

[0025] According to one embodiment of the embodiment herein, a method is provided for locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module) in GSM based devices. In GSM enabled devices, the embodiment herein prevents an unauthorized user from removing the SIM. According to one embodiment of the embodiment herein, the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the device. The trigger message is any one of an email, and a SMS. Once the device is lost, a user blocks the SIM in the device so that an authorized person does not misuse the SIM. [0026] According to one embodiment of the embodiment herein, a method is provided for locking a lost portable communication device during an attempt to flash CDMA based devices. The embodiment herein provides a data security and prevents an unauthorized user from flashing the portable communication device. According to one embodiment of the embodiment herein, the portable communication device verifies any user accessing the device using biometrics authentication. The biometric authentication is selected from a group consisting of a voice analysis, a facial recognition, and a finger print verification. Further, the device initiates a lock command when the user fails to verify the identity using biometric data. The lock command restricts the functionality of the device.

[0027] According to one embodiment of the embodiment herein, the security module provides data security and prevents an unauthorized user from using the portable communication device. Further, the security module enables a user to send a lock message to initiate a locking of the lost mobile device, thereby preventing a misuse of the portable communication device. The server permits access to the owner upon submitting a command to lock the device when the mobile device is lost or stolen, by using the contact details and the password of the owner of the lost mobile device. Likewise, the serial number and/or telephone number of the mobile device is automatically stored in the server for registering with the lock service so that the device is identified when an instruction for locking the mobile device is received from the registered user of the mobile device. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0028] According to one embodiment of the embodiment herein, a method for locking a lost portable communication device is provided. The method comprises providing a user interface (UI) to the registered user of the mobile device to provide an option to register for a locking service of a remote device. Further, the registered owner of the mobile device enters an emergency contact number and a password during the registering of the device with the device manufacturer. When a loss of the mobile device is reported, the method involves sending a trigger message to the emergency contact number when an unauthorized user accesses the mobile device. The trigger message includes a location information of the device and a confirmation request to lock the device. The location information is a GPS location of the device. Thus, the method enables the user to track the device with the GPS location. The lock command in the trigger message is a remotely initiated instruction sent via a server to the lost mobile device to stop either a partial of fully operational functionalities of the lost mobile device remotely. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0029] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating the preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.

BRIEF DESCRIPTION OF THE DRAWINGS

[0030] The other objects, features and advantages will occur to those skilled in the art from the following description of the preferred embodiment and the accompanying drawings in which:

[0031] FIG. 1 is a flowchart explaining a method for providing data security in a portable communication device.

[0032] FIG. 2 illustrates a flowchart explaining a method for locking a lost portable device through SMS message, according to one embodiment of the embodiment herein.

[0033] FIG. 3 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to flash

[0034] FIG. 4 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module), according to one embodiment of the embodiment herein. [0035] FIG. 5 is a block diagram of a system for providing data security.

[0036] Although the specific features of the embodiment herein are shown in some drawings and not in others. This is done for convenience only as each feature may be combined with any or all of the other features in accordance with the embodiment herein.

DETAILED DESCRIPTION OF THE EMBODIMENTS HEREIN

[0037] In the following detailed description, a reference is made to the accompanying drawings that form a part hereof, and in which the specific embodiments that may be practiced is shown by way of illustration. These embodiments are described in sufficient detail to enable those skilled in the art to practice the embodiments and it is to be understood that other changes may be made without departing from the scope of the embodiments. The following detailed description is therefore not to be taken in a limiting sense.

[0038] The various embodiments of the embodiment herein disclose a system and method for immediately locking a lost portable communication device by sending a short media service (SMS). The SMS initiates a lock command that directly communicates with the IMEI number of the portable communication device.

[0039] According to an embodiment herein, a method for providing data security in a portable communication device is disclosed. A security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function. A user is enabled to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, a biometric scanner is activated on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access. A trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM. The trigger message comprises a lock request confirmation and a location information of the portable communication device. Further, a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails. Thus, locking of the portable communication device provides data security.

[0040] According to an embodiment herein, the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command. The lock command restricts the functionality of the device. According to an embodiment herein, the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification. The step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success. The step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0041] According to an embodiment herein, the location information is a GPS location of the device provided by the GPS module.

[0042] According to an embodiment herein, the system for providing data security in a portable communication device comprises an IMEI module, a biometric scanner, a security module, and a GSM module. The security module is installed under an operating system of the mobile device operating system. The security module communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function. The security module is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, the security module is configured to activate a biometric scanner on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access. The security module is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM. The trigger message comprises a lock request confirmation and a location information of the portable communication device. The security module is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails. A One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0043] According to an embodiment herein, the system further comprises a IMEI module configured to receive message that directly communicates with the IMEI number of the portable communication device. The lock command restricts the functionality of the device. The system further comprises a biometric scanner configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification. The system includes a Global Positioning system or GPS module for determining location information.

[0044] According to one embodiment of the embodiment herein, a method is provided for locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module) in GSM based devices. In GSM enabled devices, the embodiment herein prevents an unauthorized user from removing the SIM. According to one embodiment of the embodiment herein, the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the device. The trigger message is any one of an email, and a SMS. Once the device is lost, a user blocks the SIM in the device so that an authorized person does not misuse the SIM.

[0045] According to one embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0046] According to one embodiment of the embodiment herein, the security module provides data security and prevents an unauthorized user from using the portable communication device. Further, the security module enables a user to send a lock message to initiate a locking of the lost mobile device, thereby preventing a misuse of the portable communication device. The server permits access to the owner upon submitting a command to lock the device when the mobile device is lost or stolen, by using the contact details and the password of the owner of the lost mobile device. Likewise, the serial number and/or telephone number of the mobile device is automatically stored in the server for registering with the lock service so that the device is identified when an instruction for locking the mobile device is received from the registered user of the mobile device. [0047] According to one embodiment of the embodiment herein, a method for locking a lost portable communication device is provided. The method comprises providing a user interface (UI) to the registered user of the mobile device to provide an option to register for a locking service of a remote device. Further, the registered owner of the mobile device enters an emergency contact number and a password during the registering of the device with the device manufacturer. When a loss of the mobile device is reported, the method involves sending a trigger message to the emergency contact number when an unauthorized user accesses the mobile device. The trigger message includes a location information of the device and a confirmation request to lock the device. The location information is a GPS location of the device. Thus, the method enables the user to track the device with the GPS location. The lock command in the trigger message is a remotely initiated instruction sent via a server to the lost mobile device to stop either a partial of fully operational functionalities of the lost mobile device remotely.

[0048] According to one embodiment of the embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated. [0049] FIG. 1 is a flowchart explaining a method for providing data security in a portable communication device. A security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function (100). A user is enabled to initiate a message from a registered mobile device when the portable communication device is lost (102). The message comprises a lock command. Further, a biometric scanner is activated on initiating a flash request on the portable communication device (104). The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access. A trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM (106). The trigger message comprises a lock request confirmation and a location information of the portable communication device. Further, a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails (108). Thus, locking of the portable communication device provides data security.

[0050] According to an embodiment herein, the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command. The lock command restricts the functionality of the device. According to an embodiment herein, the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification. The step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success. The step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device.

[0051] According to an embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0052] According to an embodiment herein, the location information is a GPS location of the device provided by the GPS module.

[0053] FIG. 2 is a flowchart illustrating the steps of locking a lost portable communication device with an SMS, according to one embodiment of the embodiment herein. The embodiment herein provides data security and prevents an unauthorized user from using the lost (stolen or misplaced) portable communication device a portable communication device, hereinafter referred to as a device.

[0054] In CDMA based systems, the mobile device is identified using an equipment identifier known as an internal mobile equipment identity (IMEI). Each IMEI number is mapped with a user profile. A user registers his\her mobile device with the Digital Identity Management Service (DIMS). Further, the Digital Identity Management Service (DIMS) is designed to keep the records of the IMEI number of phones.

[0055] According to one embodiment of the embodiment herein, the device provides an owner to pre-register with a device lock service. The system includes a server permitting access to the owner upon submitting a command to lock the device when the registered mobile device is later lost or stolen, by using the contact details and the password of the registered owner. Likewise, the serial number and/or telephone number of registered mobile device is automatically stored in the server for registering with the lock service so that the registered device is identified, when an instruction for locking the registered device is received from an authorized/registered owner of the mobile device.

[0056] With reference to FIG. 1, the method for locking a lost portable communication device with an SMS comprises the following steps of processes. At step 200, the portable mobile device displays a user interface (UI) for providing the owner with an option to register for a remote device lock service. Further, the owner enters the emergency contact number and a password during the registration of the mobile device with the respective device manufacturer. At step 202, the loss of the mobile device is reported. At step 204, an unauthorized user access the lost mobile device and attempts to use the lost mobile device by changing the carrier or by flashing the device. At step 206, the lost mobile device sends a trigger message to the emergency contact number using the security module. The trigger message includes a location information of the lost mobile device and a confirmation request to lock the lost mobile device. The address comprises a GPS location of the lost mobile device. Thus, the method enables the user to track the lost mobile device with the GPS location.

[0057] At step 208, the registered owner of the lost mobile device sends an SMS with a lock command. The lock command is a remotely initiated instruction sent via a server to the lost mobile device to stop the operational functionalities of the lost mobile device either fully or partially. Thus the mobile device completely shut down or 'killed' so that the lost mobile is completely not operable, in which case, the lock command will be a kill switch. Alternately, the lock command disables every functions, but displays a telephone number to call to report that the lost mobile device has been found, or an email address to contact, or both. The lost mobile device is permitted only to contact this number or email, without being permitted to contact other emails or numbers, except perhaps an emergency services number.

[0058] According to an embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0059] According to one embodiment of the embodiment herein, the mobile device provides an owner to subscribe to lock service following theft or loss of a device. The system receives a request to lock the device, which is received by the registered owner via a terminal. Afterwards, the server establishes a communication link with the device, which is initiated either by the lost mobile device or the server. The server sends a lock command to the lost mobile device. The lock command results in a reduction of functionality available on the lost mobile device. For example, the device is limited to calling a specified number to inform a responsible party of the whereabouts of the device, when the device is a mobile phone. Alternately, the lost device is simply configured to display a number to call or an email address to contact.

[0060] According to one embodiment of the embodiment herein, the system for locking the device with the SMS automatically publishes the device and its identifying details, such as a serial number, in the lost and found database. The details may already be stored there and a flag is simply be set to indicate that the device is now lost or stolen, which results in publishing the details of the lost or stolen device. When the registered owner has logged on to the server, a single command is used/ sufficient for sending a request for locking the lost mobile device and publishing the details of the locked mobile device that is lost and found in a database.

[0061] According to one embodiment of the embodiment herein, the system for locking a lost device further enables a person to retrieve the lost mobile device after the lost mobile device is found. The system receives a notification that the mobile device which is reported and published as lost or stolen has been found. The finder of the mobile device is verified, for example, that the serial number of the device matches the serial number displayed on a website that presents information about devices marked in the database as lost or stolen. Thus, the system and method of embodiment herein provides a data security and helps to retrieve the lost mobile device. In case, the lost mobile device is not retrieved, the system enables the authorized/registered user to send a message with the lock command and stop the functionality of the lost mobile device.

[0062] FIG. 3 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to flash, according to one embodiment of the embodiment herein. The embodiment herein provides data security and prevents an unauthorized user from flashing the portable communication device. According to one embodiment of the embodiment herein, the portable communication device verifies any user accessing the device using biometrics authentication. The biometric authentication is any one of voice analysis, facial recognition, and finger print verification. In accordance with the embodiment herein, the user is permitted to access the device only if he is authenticated using biometrics.

[0063] A user registers his\her biometric profile data including his\her voice and facial image with the Digital Identity Management Service (DIMS). Further, the Digital Identity Management Service (DIMS) is used to keep records of the IMEI number of phones. In CDMA based systems, the mobile device is identified using an equipment identifier known as an internal mobile equipment identity (IMEI). Each IMEI number is mapped with a biometric profile.

[0064] At step 300, a portable communication device, is reported as lost (stolen or misplaced). At step 302, an unauthorized user access the lost device and attempts to use the lost device by changing the carrier. In order to change the carrier, the user initiates flashing of the lost device. At step 304, the lost device requests for biometric authentication to initiate flashing. At step 306, the biometric data is compared to the biometric profile registered with the respective device. At step 308, the user is denied access to flash the lost device if the biometric data does not match with the biometric profile. At step 310, the lost device initiates a lock command when user fails to verify the identity using biometnc data. The lock command restricts the functionality of the lost device. The lock command is a remotely initiated instruction sent via a server to the lost device to stop operation of the lost device, either in full or partially. It may mean 'killing' the device so that it becomes completely inoperable, in which case the lock command will be a kill switch. Alternately, the lock command disables every functions, but displays a telephone number to call to report that the lost device has been found, or an email address to contact, or both. The lost device is permitted to contact this number or email, without being permitted to contact other emails or numbers, except perhaps an emergency services number.

[0065] Non-limiting examples of a device include a laptop, cell phone, personal digital assistant, smart phone, memory stick, personal media device, gaming device, personal computer, tablet computer, electronic book, and netbook.

[0066] According to an embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated. [0067] FIG. 4 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module), according to one embodiment of the embodiment herein. In GSM enabled devices, the embodiment herein prevents an unauthorized user from removing SIM. According to one embodiment of the embodiment herein, the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the lost device. The trigger message is one of an email, and a SMS. Once the device is lost, a user blocks the SIM in the lost device so that an authorized person does not misuse the SIM. However, the unauthorized user attempts to communicate through the lost device by replacing the existing SIM with a new SIM.

[0068] At step 402, an unauthorized user attempts to replace the existing SIM with a new SIM in the lost device. The new SIM enables the unauthorized user to perform cellular functions in the lost device. At step 404, a trigger message is sent to the registered number in response to change in existing SIM. The registered number is the number of an authorized user's friend or relative. The trigger message includes the location information of the lost device and confirmation request to lock the device. At step 406, the authorized user responds to the trigger message by sending a confirmation message to lock the lost device. At step 408, the lost device is locked. The lock command restricts the functionality of the lost device. The lock command is a remotely initiated instruction sent via a server to the lost device to stop the functioning of the lost device and software in the lost device, either in full or partially. It may mean 'killing' the device so that it becomes completely inoperable, in which case the lock command will be a kill switch. Thus, the method prevents the unauthorized user from using the lost device. Further, the data in the lost device is protected from misuse. [0069] According to an embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0070] FIG. 5 is a block diagram of the system for providing data security. According to an embodiment herein, the system for providing data security in a portable communication device comprises security module 502, biometric scanner 504, IMEI module 506, and GPS module 508. The security module 502 is installed under an operating system of the mobile device operating system. The security module 502 communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function. The security module 502 is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, the security module 502 is configured to activate a biometric scanner on initiating a flash request on the portable communication device. The biometric scanner 504 authenticates a user accessing the portable communication device and prevent unauthorized access. The security module 502 is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM. The trigger message comprises a lock request confirmation and a location information of the portable communication device. The security module 502 is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails.

[0071] According to an embodiment herein, the system further comprises the IMEI module 506 configured to receive message that directly communicates with the IMEI number of the portable communication device. The lock command restricts the functionality of the device. The system further comprises the biometric scanner 504 configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification. The system includes a Global Positioning system or GPS module 508 for determining location information.

[0072] According to an embodiment herein, a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request. The locking application is configured to generate OTP. The locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP. The locking command application is configured to authenticate and verify the OTP received from the registered number. The application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.

[0073] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating the preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.

[0074] The embodiments herein provide a system and method for providing data security and prevents an unauthorized user from using the lost or stolen portable communication device. The system and method of embodiment herein provides data security and helps to retrieve the device. In case, the device is not able to be retrieved, the system enables the user to send a message with the lock command and stop the functionality of the device.

[0075] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such as specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments.

[0076] It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modifications. However, all such modifications are deemed to be within the scope of the claims to be submitted at the time of filing a complete specification.