US 9,811,692 B2
Security and protection device and methodology
Sahal Alarabi, San Mateo, CA (US)
Filed by Sahal Alarabi, San Mateo, CA (US)
Filed on Jun. 16, 2016, as Appl. No. 15/183,836.
Application 15/183,836 is a continuation of application No. 14/275,617, filed on May 12, 2014.
Prior Publication US 2016/0292464 A1, Oct. 6, 2016
Int. Cl. G06F 21/88 (2013.01); H04L 29/06 (2006.01); H04W 12/12 (2009.01); G06F 21/71 (2013.01); H04W 12/08 (2009.01)
CPC G06F 21/88 (2013.01) [G06F 21/71 (2013.01); H04L 63/0876 (2013.01); H04L 63/107 (2013.01); H04L 63/1433 (2013.01); H04W 12/08 (2013.01); H04W 12/12 (2013.01); G06F 2221/2101 (2013.01); G06F 2221/2111 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A security device to protect a mobile device against theft or misplacement, the security device comprising:
memory configured to store
a friendly device table that: includes information associated with a plurality of wireless-enabled devices, wherein each wireless-enabled device serves as a reference point for the mobile device and has a predetermined secure zone,
an event location table that includes information associated with a plurality of event locations, wherein each event location is assigned at least one wireless-enabled device that communicates with the mobile device, and
circuitry: configured to:
compute a first risk level based on a first location of the mobile device with respect to the predetermined secure zones of the wireless-enabled devices;
calculate a second risk level based on proximity of the mobile device with respect to at least one event Ideation of the plurality of event locations,
compute a third risk level based on information obtained from a plurality of sensors disposed on the mobile device,
compute an overall risk level based on the first risk level, the second risk level, the third risk level, and a predetermined risk-assessment table,
calculate a change in the overall risk level of the mobile device,
formulate a shared risk network of the mobile device, the shared risked network representing a plurality of other devices and a corresponding overall risk of each other device of the plurality of other devices, a change in the overall risk of the mobile device causing a change in the overall risk of each of the other devices, and
perform a type of security action based on the calculated change in the overall risk level of the mobile device, wherein a duration of the performed security action is based on the calculated change in the overall risk level of the mobile device.