Portable electronic devices (“PEDs”) configured to record and monitor access attempts is provided.
Portable electronic devices (“PEDs”) are commonly used. Such PEDs include a front facing camera, and are equipped to transmit and receive information through a wireless network, such as 4g. Such networks allows the PEDs to access various websites and have become useful in assisting users with obtaining their financial information and conducting financial transactions. Accordingly, PEDs may be programmed to automatically lock access to the PED until a password or code is entered.
The password/code is typically a random assembly of letters, characters, a word or words, or a pattern. The user simply tries to access the PED by either pushing a button which opens up the password/code page wherein a respective word, code or pattern is entered.
A PED configured to record and monitor access attempts and a method of recording and monitoring attempts to access a PED are provided. The PED includes a display, a camera mounted to the display and an access recording program. The PED includes an access program configured to lock access to the applications. The access program generates an entry on the display and an input such as a keyboard or a pattern board. The user engages the input so as to provide an access code. Upon receipt of the access code, the access program provides the user with access to the PED.
The access recording program may be further configured to count the number of unsuccessful attempts made to access the PED. The access recording program processes the number of unsuccessful access attempts and after a predetermined number of unsuccessful attempts actuates the camera so as to take a picture of the user who attempted the unsuccessful attempts.
The access recording program may be further configured to store the picture and automatically send the picture to the owner of the PED. The access recording device may be further configured to send information as to the location and time the unsuccessful attempts at accessing the PED was made. Accordingly, the owner of the PED may learn who has tried to access their PED, and where and when an unauthorized attempt at accessing their phone was made.
The embodiments set forth in the drawings are illustrative and exemplary in nature and not intended to limit the subject matter defined by the claims. The following detailed description of the illustrative embodiments can be better understood when read in conjunction with the following drawings where like structure is indicated with like reference numerals and in which:
A PED configured to record and monitor access attempts and a method of recording and monitoring attempts to access a PED are provided. For use herein, a PED is a portable device having wireless communication with a remote server, such as a phone like an iPhone® or Sony Galaxy®, a tablet such as iPad® or Fire HD®, or a laptop computer such as a surface pro®. The PED is configured to take a picture of the person attempting an unauthorized/unsuccessful attempt to access the PED.
With reference now to
Upon receipt of the access code, the access program 16 provides the user with access to the PED 10. The access program 16 is further configured to report to the access recording program 18 the number of unsuccessful attempts made to access the PED 10. The access recording program 18 processes the number of unsuccessful access attempts and may actuate the camera 14 so as to take a picture of the user who attempted the unsuccessful attempts.
The access recording program 18 may be further configured to store the picture and automatically send the picture to the owner of the PED 10. The access recording device may be further configured to send information as to the location and time the unsuccessful attempts at accessing the PED 10 was made. Accordingly, the owner of the PED 10 may learn who has tried to access their PED 10, and where and when an unauthorized attempt at accessing their phone was made. The PED 10 may also include a facial recognition segment 22 configured to scan the images and contacts stored in the PED 10 and match the captured image with a person in the database of the PED 10. Thus, the name of the person as well as the image may be transmitted to the owner.
With reference now to
The PED 10 includes a camera 14 mounted to the display 12. The camera 14 is configured to take a picture of the face of the user. Any such camera 14 currently known and used in the art may be adapted for use herein, illustratively including but not limited to the front facing camera 14 found on the iPhone®, iPad®, Fire HD® tablet, Sony Galaxy® phone or surface pro® tablet.
The PED 10 includes an access program 16. The access program 16 is configured to restrict access to the PED 10. The access program 16 may restrict access to the PED 10 after the PED 10 has remained idle after a predetermined period of time, has gone into sleep mode, or upon being turned on The access program 16 may require either a code to gain access to the PED 10. It should be appreciated by those skilled in the art that the term “gain access” means the ability of a user to navigate through the various software programs embedded in the PED 10. The code may not necessarily be a word, but an alphanumeric entry, a numeric entry, or a pattern. The access program 16 may allow for any code entry desired by the owner of the PED 10.
The access program 16 generates an access entry box, or pattern board as the user dictates. In the instance that an entry box is generated and a touchscreen display 12 is provided, a keyboard may appear allowing the user to enter the code. It should be appreciated that some PED 10s have a physical keyboard allowing the user to type in the code. In the instance that a pattern board is generated, the user simply draws the pattern to generate the code.
With reference again to
In one embodiment, the access recording program 18 is configured to process the PED 10 so as to determine the primary email address of the owner. In another embodiment the access recording program 18 may be configured to receive an email address for which to send the picture to. The access recording program 18 may be configured to transmit the picture to multiple email addresses entered by the owner. The access recording device may be further configured to send. The access recording device may process the PED 10, in particular a GPS program, or the clock program so as to provide information as to the location and time the unsuccessful attempts at accessing the PED 10 was made. Accordingly, the owner of the PED 10 may learn who has tried to access their PED 10, and where and when an unauthorized attempt at accessing their phone was made. The access recording program 18 may be installed in the PED 10 before sales and distribution or may be downloaded by the owner of the phone.
With reference now to
The access recording program then transmits the picture to the owner of the PED by demanding that the PED send the picture to the predetermined phone number vis-à-vis a text or to an email. The access recording program may be further configured to transmit the picture to the CPU which may actuate the facial recognition segment 22. The facial recognition segment 22 then process the contact database 24 of the phone and attempts to match the picture with a person on the contact database. In the event of a match, the access recording program 18 then transmits the name of the person and the picture to the predetermined phone number or to a predetermined email, or both.
A method for recording and monitoring attempts to access a PED 10 is also provided. With reference now to
While particular embodiments have been illustrated and described herein, it should be understood that various other changes and modifications may be made without departing from the spirit and scope of the claimed subject matter. Moreover, although various aspects of the claimed subject matter have been described herein, such aspects need not be utilized in combination.