Friday, September 3, 2010

Apple's "Big Brother" spy patent

So AAPL filed for a new patent. Apple, of course, claims that this is necessary so it can find an unauthorized user of your phone, and thus, it can wipe your phone clean. The patent claim is below:

Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.

What is claimed
1 . A method for identifying an unauthorized user of an electronic device, the method comprising: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user's operation of the electronic device in response to determining, wherein the unauthorized user's operation comprises operations not related to the authentication; and transmitting an alert notification to a responsible party in response to gathering.

2 . The method of claim 1, wherein determining further comprises: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.

3 . The method of claim 1, wherein determining further comprises: identifying a particular activity performed by the current user that indicates suspicious behavior.

4 . The method of claim 3, wherein the particular activity comprises one or more of hacking the electronic device, jailbreaking the electronic device, unlocking the electronic device, removing a SIM card from the electronic device, and moving at least a predetermined distance away from a synced device.

5 . The method of claim 1, wherein gathering further comprises gathering one or more of screenshots, keylogs, communications packets served to the electronic device, and information related to a host device coupled to the electronic device.

6 . The method of claim 1, wherein the alert notification comprises a general message indicating that an unauthorized user has been detected.


7 . The method of claim 1, wherein the alert notification comprises at least a portion of the gathered information.

8 . The method of claim 1, further comprising: gathering information related to the identity of the unauthorized user in response to determining; and gathering information related to the location of the electronic device in response to determining.

9 . The method of claim 1, further comprising: restricting at least one function of the electronic device in response to determining.

10 . The method of claim 1, further comprising: transmitting sensitive data from the electronic device to a remote storage; and erasing the sensitive data from the electronic device.

11 . An electronic device operable to detect an unauthorized user of an electronic device, the electronic device comprising: a processor operable to: receive an input from a current user of the electronic device; determine the input is not associated with an authorized user of the electronic device; and record usage information of the electronic device in response to determining; and communications circuitry operable to transmit the usage information to a remote device.

12 . The electronic device of claim 11, further comprising: a microphone operable to record the voice of the current user; and wherein the processor is further operable to: compare the recorded voice with voice prints of authorized user of the electronic device; and determine that the recorded voice does not match the voice print of any authorized user of the electronic device.


13 . The electronic device of claim 11, further comprising: a heartbeat sensor operable to detect the heartbeat of the current user; and wherein the processor is further operable to: compare the detected heartbeat with heart signatures of each authorized user of the electronic device; and determine that detected the heartbeat does not match the heart signature of any authorized user of the electronic device.

14 . The electronic device of claim 11, further comprising: an input device operable to receive an authenticating input for authenticating a user of the electronic device; and wherein the processor is further operable to: determine that a predetermined number of successive incorrect authenticating inputs have been received.

15 . The electronic device of claim 11, further comprising: a camera operable to take a photograph of the vicinity of the electronic device; and positioning circuitry operable to determine current location information of the electronic device; and wherein the processor is further operable to: geotag the photograph by associating the photograph with the current location information.

16 . The electronic device of claim 11, further comprising: an accelerometer operable to record a vibration profile of the electronic device; and a signal processor operable to compare the recorded vibration profile with a library of vibration profiles to determine a current mode of transportation of the electronic device.

17 . A system comprising: an electronic device comprising; an input device operable to receive a password provided by a user; a camera operable to take a photograph of the user; a processor operable to: determine that a predetermined number of incorrect passwords have been successively received; direct the camera to take a photograph of the user; and generate an alert notification in response to the processor determining, wherein the alert notification comprises information related to the identity of the user and the photograph of the user; and communications circuitry operable to transmit the alert notification to a remote device.

18 . The system of claim 17, wherein: the camera is operable to take a plurality of photographs of the surroundings of the electronic device; and wherein the processor is further operable to: analyze each of the plurality of photographs to identify distinguishing landmarks in the photographs; and determine the location of each photograph based on the identified distinguishing landmarks.

19 . The system of claim 17, wherein the alert notification is transmitted via one of text message, facsimile, VoIP application, instant messaging application, on-line profile application, on-line blog application, and a cloud server.

20 . Machine-readable media for identifying unauthorized users of an electronic device, comprising machine-readable instructions recorded thereon for: determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user's operation of the electronic device in response to determining, wherein the unauthorized user's operation comprises operations not related to authentication; and transmitting an alert notification to a responsible party in response to gathering.

21 . The machine-readable media of claim 20, further comprising machine-readable instructions recorded thereon for: determining the identity of the current user; comparing the determined identity to the identity of one or more authorized users of the electronic device; and detecting that the determined identity does not match the identity of at least one of the one or more authorized users.



In other words, AAPL will be able to record your voice, take a photo of where you are with your phone, and take your heartbeat to further identify you biometrically. I'll repeat myself. Your AAPL product, will allow Steve Jobs, to obstensibly spy on you, listen to your conversations and heartbeat, monitor your Internet use, and take a photo of you using your phone.

Big Brother AAPL wants to know who you are, where you are, what you are doing, and what you are saying, and what you are surfing over the Internet while biometrically measuring how fast your heart is beating while you are doing the same.

13 comments:

Settembrini said...

so you are saying Apple is a buy?

Anonymous said...

lmao ^^

Anonymous said...

This is weird

Anonymous said...

Nice dispatch and this mail helped me alot in my college assignement. Gratefulness you for your information.

Anonymous said...

Sorry for my bad english. Thank you so much for your good post. Your post helped me in my college assignment, If you can provide me more details please email me.

Anonymous said...


louis [url=http://www.hamicad.co.uk/]Hollister UK[/url] vuitton uk to state not very many

The German Cancer Research Center [url=http://www.frufru.co.uk/]ChristianLouboutinShoesUK[/url] (Deutsches [url=http://www.calvatia.co.uk/]Beats UK[/url] Krebsforschungszentrum, DKFZ), employing over 2,500 personnel, [url=http://www.fapelweb.org/]ChristianLouboutinuk[/url] should be the largest biomedical research institute in Germany. Above 1,000 scientists are functioning to review the mechanisms of cancer development, identify cancer risk factors and develop new tactics for better cancer prevention, more precise diagnosis and efficient remedy for cancer patients. Additionally, your staff of cancer Information Service (KID) provides details of this widespread disease for patients, themselves, in addition to most folks.

Mixing innovative materials with craftsmanship and a spotlight [url=http://www.omama.co.uk/]ChristianLouboutinShoes[/url] to detail, barbour jackets bring distinctive style to every one one wardrobe. In barbour sale uk, you can find a variety of mens barbour and womens barbour are along with the high-quality, fashionable design and preferential price. Beautiful within their simplicity, unmistakable of [url=http://www.candat.fr/]Louboutinpascher[/url] their character and type, [url=http://www.highcliffevillage.co.uk/]Beats By Dr Dre Uk[/url] every one of barbour online jacket offers you unprecedented satisfaction.

Car buyers levitate grandly into the riffraff and pretaporter cars. Glamour begets glamour. [url=http://www.foxliving.co.uk/]Chanel UK[/url] Everybody TMs happy.. [url=http://www.alcat.co.uk/]Chanel bags UK[/url] T's Nyc fashion week, and there's a lot to hate about it. The flat. The extremely skinny, disturbingly young runway models who're delayed as "ideal", and all sorts of ways they're exploited.

Anywhere near that much more generates a wonderful result, offering this clutch i465 its excellent search. Large, smaller and funnel. The leeway associated with Fendi bag moves compare unique car features with the [url=http://www.guardianselfstorage.co.uk/]Gucci Outlet UK[/url] outlook.



http://www.alcat.co.uk/
[url=http://www.unionroad.org/]Christian Louboutin Outlet[/url]
[url=http://www.oliveumc.org/]Michael Kors Handbags Outlet[/url]
[url=http://www.regulatecannabissb.org/]north face outlet[/url]
[url=http://www.BeachSkaters.com/]north face outlet online[/url]
[url=http://www.gneostyle.org/]north face jackets[/url]
[url=http://www.ourhousega.com/]Hollister Clothing[/url]
[url=http://www.pbooksineurope.org/]Christian louboutin outlet[/url]
[url=http://www.wichurch.org/]Christian louboutin bags[/url]
[url=http://www.sopasquare.co.uk/]Gucci Outlet UK[/url]
[url=http://www.manicmama.co.uk/]Gucci bags UK[/url]
[url=http://www.thurible.co.uk/]ChristianLouboutinShoesuk[/url]

Anonymous said...

A person essentially help to make significantly articles I might state.
That is the very first time I frequented your website page and to this point?
I surprised with the research you made to make
this actual publish extraordinary. Excellent job!


Also visit my website - tech news world

Anonymous said...

I think the admin of this web page is actually working hard for his web site, as here every
material is quality based stuff.

Also visit my webpage; Pure Select

Anonymous said...

It's perfect time to make some plans for the longer term
and it's time to be happy. I've read this publish and if I could I wish to suggest you few interesting things
or suggestions. Perhaps you could write subsequent
articles relating to this article. I desire
to learn even more issues approximately it!


Here is my web blog clash of clans hack android

Anonymous said...

You would not normally discover reflux but if it occurs oftn symptoms
might start to appear.

Anonymous said...

Sweet blog! I found it while browsing on Yahoo
News. Do you have any suggestions on how to get listed in Yahoo News?

I've been trying for a while but I never seem to get there!
Appreciate it

Visit my blog post ... water damage mesa

Anonymous said...

e cigarettes, smokeless cigarettes, vapor cigarette, ecigs, smokeless cigarettes, best electronic cigarette

Anonymous said...

e cigarette forum, e cig reviews, electronic cigarettes, electronic cigarette, smokeless cigarette, electronic cigarette