Abstract: The present disclosure relates to system(s) and method(s) for generating alerts based on a status of a set of features corresponding to a mobile device. The system is configured to transmit a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal. Further, the system is configured to accept registration data corresponding to the mobile device from a mobile application installed over the mobile device and register the mobile device over a second wireless communication channel based on the registration data. Once the mobile device is registered, the system may receive mobile data from the mobile application through the second wireless communication channel after a predefined time interval and generate one or more security alerts based on the analysis of mobile data.
Claims:1. A system for generating alerts based on a status of a set of features corresponding to a mobile device, the system comprising:
a memory; and
a processor coupled to the memory, wherein the processor is configured to execute program instructions stored in the memory for:
transmitting a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal, wherein the feature deactivation instruction is transmitted through a first wireless communication channel, wherein the feature deactivation instruction is configured to activate a mobile application installed on the mobile device, and wherein the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction;
accepting registration data corresponding to the mobile device from the mobile application;
registering the mobile device over a second wireless communication channel based on the registration data;
receiving mobile data from the mobile application through the second wireless communication channel after a predefined time interval, wherein the mobile data comprises a current operational status corresponding to each feature from the set of features; and
generating one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
2. The system of claim 1, wherein the set of features include a camera, a chatting application, a web browser, an FTP client, and a fingerprint scanner.
3. The system of claim 1, wherein the first wireless communication channel is selected from a Near Field Communication (NFC) channel, a Radio Frequency Identification (RFID) channel or a Bluetooth channel.
4. The system of claim 1, wherein the second wireless communication channel is selected from a Wi-Fi communication channel, a Wi-max communication channel, and a zigbee communication channel.
5. The system of claim 1, wherein the mobile application is configured to periodically capture the mobile data after the predefined time interval, and wherein the one or more alerts are generated after the predefined time interval.
6. The system of claim 1, further configured to transmit a deactivation signal to the mobile device when the mobile device is out of the vicinity of a security terminal, wherein the deactivation signal is transmitted through the first wireless communication channel for deactivation the mobile application.
7. A method for generating alerts based on a status of a set of features corresponding to a mobile device, the method comprising:
transmitting, by a processor, a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal, wherein the feature deactivation instruction is transmitted through a first wireless communication channel, wherein the feature deactivation instruction is configured to activate a mobile application installed on the mobile device, and wherein the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction;
accepting, by the processor, registration data corresponding to the mobile device from the mobile application;
registering, by the processor, the mobile device over a second wireless communication channel based on the registration data;
receiving, by the processor, mobile data from the mobile application through the second wireless communication channel after a predefined time interval, wherein the mobile data comprises a current operational status corresponding to each feature from the set of features; and
generating, by the processor, one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
8. The method of claim 7, wherein the set of features include a camera, a chatting application, a web browser, an FTP client, and a fingerprint scanner.
9. The method of claim 7, wherein the first wireless communication channel is selected from a Near Field Communication (NFC) channel, a Radio Frequency Identification (RFID) channel or a Bluetooth channel.
10. The method of claim 7, wherein the second wireless communication channel is selected from a Wi-Fi communication channel, a Wi-max communication channel, and a zigbee communication channel.
11. The method of claim 7, wherein the mobile application is configured to periodically capture the mobile data after the predefined time interval, and wherein the one or more alerts are generated after the predefined time interval.
12. The method of claim 7, further configured to transmit a deactivation signal to the mobile device when the mobile device is out of the vicinity of a security terminal, wherein the deactivation signal is transmitted through the first wireless communication channel for deactivation the mobile application.
13. A non-transitory computer readable medium embodying a program executable in a computing device for generating alerts based on a status of a set of features corresponding to a mobile device, the computer program product comprising:
a program code for transmitting a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal, wherein the feature deactivation instruction is transmitted through a first wireless communication channel, wherein the feature deactivation instruction is configured to activate a mobile application installed on the mobile device, and wherein the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction;
a program code for accepting registration data corresponding to the mobile device from the mobile application;
a program code for registering the mobile device over a second wireless communication channel based on the registration data;
a program code for receiving mobile data from the mobile application through the second wireless communication channel after a predefined time interval, wherein the mobile data comprises a current operational status corresponding to each feature from the set of features; and
a program code for generating one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
, Description:FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)
Title of invention:
SYSTEM AND METHOD FOR ENTERPRISE MOBILITY MANAGEMENT
Applicant:
BitWise Solutions Private Limited
A Company incorporated in India under the Companies Act, 1956
Having Address as:
BitWise World,
Off International Convention Centre,
Senapati Bapat Road, Pune – 411016, Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.
CROSS-REFERENCE TO RELATED APPLICATIONS AND PRIORITY
[001] The present application does not claim priority from any patent application.
TECHNICAL FIELD
[002] The present disclosure in general relates to the field of data security and enterprise mobility management. More particularly, the present invention relates to a system and method for managing electronic devices in a geographical area.
BACKGROUND
[003] Nowadays, electronic devices such as computers, smart phones, laptops, and tablets are widely used in day to day life. These devices enable users to connect with rest of the world and share data/ information. Information can be easily captured in the form of digital files or images and shared publically using these devices. In the past there are instances of data security breach, in organizations, using the electronic devices. An employee of any organization may capture confidential information of the organization using these devices and misuse the confidential information.
[004] In order to address the issue of data security breach, different enterprise mobility management protocols are established and different network security system such as a firewall is installed on the electronic devices for monitoring and restricting transfer of data. However, the network security systems are not linked with the personal user equipments. A user may circumvent network security systems and capture confidential data using their personal device. The user may use personal device to capture confidential information in the form of images using camera and transmit this information to public networks.
[005] It is very difficult to monitor the activity performed using the personal device without installing a security application on these devices. Further, the security applications installed on the user device can be uninstalled.
SUMMARY
[006] This summary is provided to introduce aspects related to systems and methods for generating alerts based on a status of a set of features corresponding to a mobile device and the aspects are further described below in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter.
[007] In one embodiment, a system for generating alerts based on a status of a set of features corresponding to a mobile device is illustrated. The system comprises a processor coupled to a memory, wherein the processor is to execute programmed instructions stored in the memory. The processor may be configured to execute a programmed instruction stored in the memory. In one embodiment, the processor may execute the programmed instruction stored in the memory to transmit a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal. The feature deactivation instruction is transmitted through a first wireless communication channel. Further, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction. Further, the processor may execute the programmed instruction stored in the memory to accept registration data corresponding to the mobile device from the mobile application and register the mobile device over a second wireless communication channel based on the registration data. Once the mobile device is registered, the processor may execute the programmed instruction stored in the memory to receive mobile data from the mobile application through the second wireless communication channel after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features. Further, the processor may execute the programmed instruction stored in the memory to generate one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
[008] In one embodiment, a method for generating alerts based on a status of a set of features corresponding to a mobile device is illustrated. The method may comprise transmitting a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal. The feature deactivation instruction is transmitted through a first wireless communication channel. Further, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction. The method may further comprise accepting registration data corresponding to the mobile device from the mobile application and registering the mobile device over a second wireless communication channel based on the registration data. The method may further comprise receiving mobile data from the mobile application through the second wireless communication channel after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features. The method may further comprise generating one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
[009] In one embodiment, a non-transitory computer readable medium embodying a program executable in a computing device for generating alerts based on a status of a set of features corresponding to a mobile device is illustrated. The program comprises a program code for transmitting a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal. The feature deactivation instruction is transmitted through a first wireless communication channel. Further, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device upon receiving the feature deactivation instruction. The program comprises a program code for accepting registration data corresponding to the mobile device from the mobile application and registering the mobile device over a second wireless communication channel based on the registration data. The program comprises a program code for receiving mobile data from the mobile application through the second wireless communication channel after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features. The program comprises a program code for generating one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
BRIEF DESCRIPTION OF DRAWINGS
[0010] The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to refer like features and components.
[0011] Figure 1 illustrates a network implementation of a system for generating alerts based on a status of a set of features corresponding to a mobile device, in accordance with an embodiment of the present subject matter.
[0012] Figure 2 illustrates the system for generating alerts based on a status of a set of features corresponding to a mobile device, in accordance with an embodiment of the present subject matter.
[0013] Figure 3 illustrates a flow diagram for generating alerts based on a status of a set of features corresponding to a mobile device, in accordance with an embodiment of the present subject matter.
DETAILED DESCRIPTION
[0014] The present disclosure relates to a system and method for generating alerts based on a status of a set of features corresponding to a mobile device. The system is configured to transmit a feature deactivation instruction to the mobile device when the mobile device is in a vicinity of a security terminal. Further, the system is configured to accept registration data corresponding to the mobile device from a mobile application installed over the mobile device and register the mobile device over a second wireless communication channel based on the registration data. Once the mobile device is registered, the system may receive mobile data from the mobile application through the second wireless communication channel after a predefined time interval and generate one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval or when the current operational status corresponding to at least one feature of the set of features is active.
[0015] While aspects of described system and method for generating alerts based on a status of a set of features corresponding to a mobile device may be implemented in any number of different computing systems, environments, and/or configurations, the embodiments are described in the context of the following exemplary system.
[0016] Referring now to Figure 1, a network implementation 100 of a system 102 for generating alerts based on a status of a set of features corresponding to a mobile device is disclosed. Although the present subject matter is explained considering that the system 102 is implemented on a server, it may be understood that the system 102 may also be implemented in a variety of computing systems, such as a laptop computer, a desktop computer, a notebook, a workstation, a mainframe computer, a server, a network server, and the like. In one implementation, the system 102 may be implemented in a cloud-based environment. It will be understood that the system 102 may be accessed by a primary user through one or more user devices 104-1, 104-2…104-N, collectively referred to as user devices 104 hereinafter, or applications residing on the user devices 104. Examples of the user devices 104 may include, but are not limited to, a portable computer, a personal digital assistant, a handheld device, and a workstation, file server, version control servers, bugs tracking servers. The user devices 104 are communicatively coupled to the system 102 through a network 106.
[0017] In one implementation, the network 106 may be a wireless network, a wired network or a combination thereof. The network 106 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The network 106 may either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 106 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[0018] Further, the system 102 is configured to connect with a security terminal 110. The security terminal 110 is configured to communicate with mobile devices of users entering the geographical area 108. The communication may be established through a first wireless communication channel enabled by a first router 112 linked with the security terminal 110. Further, the system 102 may transmit a feature deactivation instruction, through the security terminal 110, to a mobile device 116 when the mobile device 116 is in a vicinity of a security terminal. The security terminal 110 may use the first wireless communication channel for transmitting the feature deactivation instruction. The first wireless communication channel may be any short rang communication channel such as Bluetooth, RFID, NFC, 3D, and 2D code scanner.
[0019] In one embodiment, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device 116. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device 116 upon receiving the feature deactivation instruction. Further, the system 102 may accept registration data corresponding to the mobile device 116 from the mobile application and register the mobile device over a second wireless communication channel, enabled by a second router 114, based on the registration data. Once the mobile device is registered, the system 102 may receive mobile data from the mobile application through the second wireless communication channel after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features.
[0020] The mobile data may be captured at a predefined time interval and received by the system 102 after predefined time interval. Further, the system 102 may generate one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval. For instance if the Wi-Fi adapter of the mobile device 116 is switched off or the mobile device 116 is out of the range of second router, the system 102 may not receive the mobile data. If the system 102 does not receive the mobile data, the system 102 may generate the one or more security alerts for the mobile device 116.
[0021] In another embodiment, the system 102 is configured to analyze the mobile data to determine the current operational status corresponding to at least one feature of the set of features. The system 102 may generate the one or more alerts when the current operational status corresponding to at least one feature of the set of features is active. For example, the user of the mobile device 116 may disable the mobile application and activate one or more features of the mobile device 116. In this situation, the system 102 is configured to detect the activation status of at least one feature of the one or more features by analyzing the mobile data and accordingly generate the one or more security alerts. The process of generating alerts based on a status of a set of features corresponding to a mobile device is further elaborated with respect to figure 2.
[0022] Referring now to Figure 2, the system 102 is illustrated in accordance with an embodiment of the present subject matter. In one embodiment, the system 102 may include at least one processor 202, an input/output (I/O) interface 204, and a memory 206. The at least one processor 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one processor 202 is configured to fetch and execute computer-readable instructions stored in the memory 206.
[0023] The I/O interface 204 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The I/O interface 204 may allow the system 102 to interact with a user directly or through the user devices 104. Further, the I/O interface 204 may enable the system 102 to communicate with other computing devices, such as web servers and external data servers (not shown). The I/O interface 204 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite. The I/O interface 204 may include one or more ports for connecting a number of devices to one another or to another server.
[0024] The memory 206 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. The memory 206 may include modules 208 and data 210.
[0025] The modules 208 include routines, programs, objects, components, data structures, etc., which perform particular tasks, functions or implement particular abstract data types. In one implementation, the modules 208 may include a scanning module 212, a device registration module 214, a mobile data capturing module 216, an alert generation module 218, and other modules 220. The other modules 220 may include programs or coded instructions that supplement applications and functions of the system 102. The data 210, amongst other things, serves as a repository for storing data processed, received, and generated by one or more of the modules 208. The data 210 may also include a local repository 226, and other data 228. The local repository 226 is configured to store device data corresponding to mobile devices in the geographical area 108.
[0026] In one embodiment, the scanning module 212 may be configured to connect with a security terminal 110. The security terminal 110 is configured to communicate with mobile devices of users entering the geographical area 108, through a first wireless communication channel enabled by a first router 112. Further, the scanning module 212 may transmit a feature deactivation instruction, through the security terminal 110, to a mobile device 116 when the mobile device 116 is in a vicinity of a security terminal 110. The security terminal 110 may use the first wireless communication channel for transmitting the feature deactivation instruction. The first wireless communication channel may be any short rang communication channel such as Bluetooth, RFID, NFC, 3D, and 2D code scanner. In one embodiment, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device 116. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device 116 upon receiving the feature deactivation instruction.
[0027] In one embodiment, the security terminal 110 may be implemented as a standalone subsystem with the scanning module 212 implemented thereon. In this case, the scanning module 212 implemented over the security terminal 110 automatically detects the mobile device 116 using the first wireless communication channel and the feature deactivation instruction may be transmitted to the mobile device 116. The first wireless communication channel may be a Near Field Communication (NFC) channel, a Radio Frequency Identification (RFID) channel or a Bluetooth channel. Upon receipt of the feature deactivation instruction the mobile device 116 may activate the mobile application for deactivation the set of features as specified in the feature deactivation instruction. The set of features may include a camera, a chatting application, a web browser, an FTP client, a fingerprint scanner, and the like.
[0028] Once the mobile application is active, the device registration module 214 is configured to accept registration data corresponding to the mobile device 116 from the mobile application and register the mobile device over a second wireless communication channel, enabled by a second router 114, based on the registration data. The the second wireless communication channel may be a Wi-Fi communication channel, a Wi-max communication channel, or a zigbee communication channel. After the registration step, the user may swipe his RFID card at a RFID scanner configured to operate the entry gate 118. It is to be noted that the entry gate 118 may operate only if the mobile device 116 is connected to the system 102 through the second wireless communication channel.
[0029] Once the mobile device 116 is registered and the user has entered the geographical area 108, the mobile data capturing module 216 is configured to receive mobile data from the mobile application through the second wireless communication channel. The mobile data may be captured after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features.
[0030] Further, the alert generation module 218 is configured to generate one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval. For instance, if the Wi-Fi adapter of the mobile device 116 is switched off or the mobile device 116 is out of the range of second router 114, the mobile data capturing module 216 may not receive the mobile data. If the mobile data capturing module 216 does not receive the mobile data, the alert generation module 218 may generate the one or more security alerts for the mobile device 116.
[0031] In another embodiment, the alert generation module 218 is configured to analyze the mobile data to determine the current operational status corresponding to at least one feature of the set of features. The alert generation module 218 may generate the one or more alerts when the current operational status corresponding to at least one feature of the set of features is active. For example, the user of the mobile device 116 may disable the mobile application and activate one or more features of the mobile device 116. In this situation, the alert generation module 218 is configured to detect the activation status of at least one feature of the one or more features by analyzing the mobile data and accordingly generate the one or more security alerts. In one embodiment, the mobile application is configured to periodically capture the mobile data after the predefined time interval. Based on the periodically captured mobile data the one or more alerts are generated after the predefined time interval.
[0032] In one embodiment, the security terminal 110 is configured to transmit a deactivation signal to the mobile device 116 when the mobile device 116 leaves the geographical area 108 and checks out at the security terminal 110. The deactivation signal is transmitted through the first wireless communication channel for deactivation the mobile application. The method for generating alerts based on a status of a set of features corresponding to a mobile device is further illustrated with respect to the block diagram of figure 3.
[0033] Referring now to figure 3, a method 300 for generating alerts based on a status of a set of features corresponding to a mobile device is disclosed, in accordance with an embodiment of the present subject matter. The method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, and the like, that perform particular functions or implement particular abstract data types. The method 300 may also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[0034] The order in which the method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 300 or alternate methods. Additionally, individual blocks may be deleted from the method 300 without departing from the spirit and scope of the subject matter described herein. Furthermore, the method 300 can be implemented in any suitable hardware, software, firmware, or combination thereof. However, for ease of explanation, in the embodiments described below, the method 300 may be considered to be implemented in the above described system 102.
[0035] At block 302, the scanning module 212 may be configured to connect with a security terminal 110. The security terminal 110 is configured to communicate with mobile devices of users entering the geographical area 108, through a first wireless communication channel enabled by a first router 112. Further, the scanning module 212 may transmit a feature deactivation instruction, through the security terminal 110, to a mobile device 116 when the mobile device 116 is in a vicinity of the security terminal 110. The security terminal 110 may use the first wireless communication channel for transmitting the feature deactivation instruction. The first wireless communication channel may be any short rang communication channel such as Bluetooth, RFID, NFC, 3D, and 2D code scanner. In one embodiment, the feature deactivation instruction is configured to activate a mobile application installed on the mobile device 116. Furthermore, the mobile application is configured to disable a set of features associated with the mobile device 116 upon receiving the feature deactivation instruction.
[0036] At block 304, the device registration module 214 is configured to accept registration data corresponding to the mobile device 116 from the mobile application.
[0037] At block 306, the device registration module 214 is configured to register the mobile device 116 over a second wireless communication channel, enabled by a second router 114, based on the registration data. The second wireless communication channel may be a Wi-Fi communication channel, a Wi-max communication channel, and a zigbee communication channel. After the registration step, the user may swipe his RFID card at a RFID scanner configured to operate the entry gate 118. It is to be noted that the entry gate 118 may be operate only is the mobile device 116 is connected to the system 102 through the second wireless communication channel.
[0038] At block 308, the mobile data capturing module 216 is configured to receive mobile data from the mobile application through the second wireless communication channel. The mobile data may be captured after a predefined time interval. The mobile data comprises a current operational status corresponding to each feature from the set of features.
[0039] At block 310, the alert generation module 218 is configured to generate one or more security alerts when the mobile data is not received from the mobile application after the predefined time interval. For instance, if the Wi-Fi adapter of the mobile device 116 is switched off or the mobile device 116 is out of the range of second router, the mobile data capturing module 216 may not receive the mobile data. If the mobile data capturing module 216 does not receive the mobile data, the alert generation module 218 may generate the one or more security alerts corresponding to the mobile device 116. In another embodiment, the alert generation module 218 is configured to analyze the mobile data to determine the current operational status corresponding to at least one feature of the set of features. The alert generation module 218 may generate the one or more alerts when the current operational status corresponding to at least one feature of the set of features is active. For example, the user of the mobile device 116 may disable the mobile application and activate one or more features of the mobile device 116. In this situation, the alert generation module 218 is configured to detect the activation status of at least one feature of the one or more features by analyzing the mobile data and accordingly generate the one or more security alerts. In one embodiment, the mobile application is configured to periodically capture the mobile data after the predefined time interval. Based on the periodically captured mobile data the one or more alerts are generated after the predefined time interval.
[0040] In one embodiment, the security terminal 110 is configured to transmit a deactivation signal to the mobile device 116 when the mobile device 116 leaves the geographical area 108 and checks out at the security terminal 110. The deactivation signal is transmitted through the first wireless communication channel for deactivation the mobile application.
[0041] Although implementations for methods and systems for generating alerts based on a status of a set of features corresponding to a mobile device has been described, it is to be understood that the appended claims are not necessarily limited to the specific features or methods described. Rather, the specific features and methods are disclosed as examples of implementations for generating alerts based on a status of a set of features corresponding to a mobile device.
| # | Name | Date |
|---|---|---|
| 1 | 201621025856-FER.pdf | 2020-01-02 |
| 1 | Form 3 [28-07-2016(online)].pdf | 2016-07-28 |
| 2 | Form 20 [28-07-2016(online)].jpg | 2016-07-28 |
| 2 | 201621025856-Correspondence-071016.pdf | 2018-08-11 |
| 3 | Form 18 [28-07-2016(online)].pdf_65.pdf | 2016-07-28 |
| 3 | 201621025856-Form 1-071016.pdf | 2018-08-11 |
| 4 | 201621025856-Power of Attorney-071016.pdf | 2018-08-11 |
| 4 | Form 18 [28-07-2016(online)].pdf | 2016-07-28 |
| 5 | Drawing [28-07-2016(online)].pdf | 2016-07-28 |
| 5 | ABSTRACT1.JPG | 2018-08-11 |
| 6 | Form 26 [06-10-2016(online)].pdf | 2016-10-06 |
| 6 | Description(Complete) [28-07-2016(online)].pdf | 2016-07-28 |
| 7 | Other Patent Document [06-10-2016(online)].pdf | 2016-10-06 |
| 8 | Form 26 [06-10-2016(online)].pdf | 2016-10-06 |
| 8 | Description(Complete) [28-07-2016(online)].pdf | 2016-07-28 |
| 9 | Drawing [28-07-2016(online)].pdf | 2016-07-28 |
| 9 | ABSTRACT1.JPG | 2018-08-11 |
| 10 | 201621025856-Power of Attorney-071016.pdf | 2018-08-11 |
| 10 | Form 18 [28-07-2016(online)].pdf | 2016-07-28 |
| 11 | 201621025856-Form 1-071016.pdf | 2018-08-11 |
| 11 | Form 18 [28-07-2016(online)].pdf_65.pdf | 2016-07-28 |
| 12 | Form 20 [28-07-2016(online)].jpg | 2016-07-28 |
| 12 | 201621025856-Correspondence-071016.pdf | 2018-08-11 |
| 13 | Form 3 [28-07-2016(online)].pdf | 2016-07-28 |
| 13 | 201621025856-FER.pdf | 2020-01-02 |
| 1 | SearchStrategy_26-07-2019.pdf |