You are on page 1of 7

Page | 1

Patent Number : 244963


Title of Invention : A COMMUNICATION DEVICE FINDER SYSTEM
Inventor Name : Nutigattu Venkata Satyanarayana
Assignee : Synergy Multitech Limited
Date Of Certificate Issue : 28/12/2010 11:16:47
PUBLICATION DATE (U/S 11A) : 17th of November, 2006
POST GRANT JOURNAL DATE (U/S 43(2)) 31st of December, 2010 N. V. Satyanarayana
:

COMPLETE SPECIFICATION

FIELD OF INVENTION

The present invention relates to a communication device finder system to recover a lost / misplaced /stolen device used for
communication.

The proposed system of recovering a lost / misplaced /stolen device used for communication can be implemented on all kinds of
wireless telephone networks that support communicating device networks that employ GSM or CDMA or TDMA or WLL or any similar
technology.

PRIOR ART

There are a number of prior publications which teach invention relating to finding a lost mobile. Some of the prior publication in the field
of the present invention are as follows:

US 7,103,367
Network-based services for misplaced cellular mobile stations
Inventors: Adams; Thomas L. (Austin, TX), Schroeder; Timothy P. (Austin, TX)
Assignee: SBC Knowledge Ventures, L.P. (Reno, NV)

Network-based services for misplaced cellular mobile stations' teaches about feature for a mobile station, wireless network, and method
of operating a wireless network for locating a misplaced mobile station and preventing its unauthorized use. The wireless network and a
base station, transmit a misplaced mobile station signal to a mobile station, causing a misplaced mobile station to ring at high volume,
display a text message, emit an audio message, and deactivate normal mobile station function.

US 7,113,803
System and method for enabling instant messaging on a mobile device
Inventor: Dehlin; Joel P. (Redmond, WA)
Assignee: Microsoft Corporation (Redmond, WA)

System and method for enabling instant messaging on a mobile device' teaches about a method and system for enabling instant
messaging on mobile devices is provided. A customized SMS message is created that awakens the mobile device so that instant
messaging may be initiated. Once the mobile device is awakened by the customized SMS message, the mobile device responds to the
customized SMS message and initiates processing. Based on information obtained, the mobile device creates a reply customized SMS
message. The reply customized SMS message is translated into a reply instant message, which is transmitted over a persistent Internet
connection to the sender responsible for awakening the mobile device. Alternatively, the mobile device may respond by creating an
Internet connection and establishing a chat session over the Internet connection. The chat session allows the exchange of instant
messages between the mobile device and the sender responsible for awakening the mobile device.

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 2

US 7,050,797
Remote control system in mobile communication terminal and method thereof
Inventors: Jung; Soo-Yong (Seoul, KR)
Assignee: LG Electronics Inc. (Seoul, KR)

Remote control system in mobile communication terminal and method thereof teaches that disclosed is a remote control system in a
mobile communication terminal and method thereof enabling a user to use the mobile communication terminal not only passively but
also actively. The present invention includes a first step of receiving a remote control command from a subscriber, a second step of
recording the remote control command in a reserved field of the page message, a third step of transmitting the page message to the
mobile communication terminal, and a fourth step of having the mobile communication terminal operate in accordance with the remote
control command included in the page message. The fourth step includes the steps of verifying a species of the received page message by
parsing the received page message, extracting the remote control command by analyzing the reserved field of the page message if the
received page message is for controlling the mobile communication terminal remotely, and controlling an operating state of the mobile
communication terminal in accordance with the extracted remote control command.

EP 1139116
Inventors: Simon Crouch, Mcdonnell James Thomas Edward, John Deryk Waters
Assignee: Hewlett-Packard Company

Teaches that a method is provided for searching for a lost asset equipped with a short-range wireless transceiver. A finder service sends
out a search request including a lost-asset identifier, this request being sent over a mobile radio infrastructure to a plurality of mobile
devices. These devices transmit on the request in their immediate vicinity using short-range wireless transceivers. Upon a mobile device
receiving back a response from the lost asset it returns a found message over the mobile radio infrastructure to the finder service, this
message either including location data concerning the whereabouts of the lost asset or enabling such data to be obtained by the finder
service.

EP 1630757
Method and system for detecting lost or stolen objects
Inventor: Rudolf Ritter
Assignee: Swisscom AG

Teaches that method for locating lost or stolen items has the following steps prior to loss of the object: marking o the object using an
RFID (radio frequency identity) tag containing a unique identifier and centra storage of the tag details together with owner unique
identification derived from the owner's mobil phone SIM card . If the item is lost, a third party who finds it scans in the RFID tag and the
owner i notified of the object's retrieval. - The invention also relates to a system for implementing th inventive method.

EP 1684535
System and method for remotely locating a lost mobile communication device Inventor
Inventor: Tom Nagy, Russel N. Owen
Assignee: Research In Motion Limited, 295 Phillip Street, Waterloo, ON N2L 3W8 / CA

Teaches a system and method of locating a lost wireless communication device. A remote server is contacted to indicate that the wireless
communication device is lost. A lost device policy setting is then activated in a database coupled to the remote server, the lost device
policy setting indicating that the wireless communication device is lost. In response to activation of the lost device policy setting, a
remote location command is then transmitted from the remote server to the wireless communication device via a wireless network. The
remote location command is subsequently received at the lost wireless communication device, which processes the remote location
command such that a user of the wireless communication device can locate the device.

EP 1545141
System and method for PIN blocking on terminal for mobile finance
Inventor: Hyun-il C-1703 Samsung Chereville 1-cha Apt Choi
Assignee: ETURE.COM Co. Ltd.

Teaches that the present invention generally relates to a system and a method for PIN blocking on a terminal for mobile finance to block
a smart chip not to use a mobile finance service with a mobile communication terminal by transmitting an SMS(Short Message Service)
message to the mobile communication terminal, when a user lost the mobile communication terminal in which the smart chip for using
the mobile finance service such as mobile banking, stock exchange and/or insurance is contained. A system and a method for PIN
blocking on a terminal for mobile finance in accordance with the present invention can remotely block a smart chip within a mobile
communication terminal when a customer lost the terminal for using a mobile financial service, thereby preventing a finder or a third
party from obtaining information stored in the smart chip or accessing the mobile financial service by disguising as the owner of the
terminal. As a result, it can remarkably increase security for customer information and financial transactions.
However, the above citations are not teaching how to locate a mobile phone which has been stolen because the thief may change SIM to
that of different mobile network service provider. A clever thief may try to disable the security activation element by deleting its
software or deleting or changing message center number. The present invention over comes any steps a smart thief may take to escape
detection and enable location of device in all circumstances.

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 3

OBJECT OF INVENTION

Primary object of the present invention is to propose a communication device finder system having a non erasable security features
installed in the device, which enables location of lost communication device independent of a specific mobile network service provider.
Another object of the present invention is to allow these security features to be disabled / activated only by the original owner of the
device or by an authorized service center, remotely, by means of sending an SMS to the lost/stolen device.
Another object of the present invention is to use one or more methods of communicating to a central server/ another device i.e. either by
messaging or generating voice Further object of the present invention is to provide the device with a security activation element for
activating and bringing into auto answer mode said communication device finder though a tele communication service provider network
on being triggered by any other designated communication device or through internet from a predetermined and designated internet
protocol (IP) address or on entering incorrect personal identification number (PIN) or pass word with or without changing said sim.
Further object of the present invention is to provide the device with a security activation element is designed for enabling the device to
send prerecorded short messaging service (SMS) and /or multimedia messaging service (MMS) or e- mails etc. after said activation
Further object of the present invention is to provide the device with a security activation element which is programmed for generating
and playing voice messages and visual messages in the device.

Further object of the present invention is to provide the device with a security activation element for auto re installing the data when
attempt is made to delete it or a non-erasable read only memory (ROM). Further object of the present invention is to provide the device
with a security activation element to find out the present location of the device.

DESCRIPTION OF INVENTION

There are various steps of the communication device finder system to recover the communication device. The recovery technique makes
use of different types of programmed communications according to the stages of recovery.

The programmed communications include :

a) Simple voice appeals to the person having the lost/misplaced/stolen communication device: Voice messages, requesting the
person holding the device to return it to its owner, are automatically generated from within the device, by the software that
has been installed in it. Details of the owner will be mentioned in pre-defined messages. There are very few chances that the
stolen device is recovered with this minimum effort.
b) By creating an environment where in the perpetrator gives in: Mortifying ring tones are pre-defined in the software and they
get activated as soon as the device switches over to the security mode. On receiving a call in public, this would cause
embarrassment and humiliation. Also the caller/receiver on the other end will be intimated without the user's knowledge
about the devices authentication. These features would affect the culprit psychologically and thus alert the public around.
c) Also there is a provision that will cause disturbance to the user by working abnormally. Say switches ON the device, when it is
switched OFF, alarming at wrong times, and making unnecessary calls to numbers in his address book, etc.
d) Accumulating adequate evidence to facilitate investigation regarding the missing device. The security activation device
comprises software modules installed on the flash memory in the device by the authorized owner. The security element is
made non-erasable by installing the auto-re-install feature set. Yet another way to achieve this is to provide the security
activation element comprising a ROM by the manufacturer at the time of manufacturing the device. This element is dormant
during the normal working of the device, but will get activated once a codified SMS message is received by the communicating
device. This codified SMS will be sent by the authorized owner of the communicating device from any other device or server to
the device in question, once he/she realizes that his/her device has been lost/misplaced/stolen.

There is another way to enable the security mode of the device. When the user tries to switch off and switch on the device
while changing the sim card, the software prompts for a password. Any password entered by the user is accepted so that he
continues using it. Implicitly a check is done whether the password encountered is the actual password. If they match, the
security mode is not activated. Else it does. This happens every time the user tries to change the sim card.

The modules and methods within this software will work over and above the inbuilt security features provided by the
manufacturer. Services that are offered in this application are:

a) sending/receiving SMS'es or MMS'es or e-mails or snaps/videos taken from the lost/stolen device
b) making voice calls
c) providing information about the location of the lost device
d) generating and playing voice messages in the device
e) displaying required visual messages on the device
f) automating calls to emergency numbers that have been provided
g) automatic conversation recording of both incoming and outgoing calls
h) It captures the screen content whenever desired and sends it across through the MMS facility.

For all forms of communication, only the existing connection is made use of. And for all these communication, the current user of the
device is billed (be it pre-paid or post-paid). If one of the emergency numbers is an international number, then the billing would be even
higher. What is visible to him/her is his/her balance getting diminished in case of prepaid service and long bills in case of post paid
service. Thus causing financial loss to the user.

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 4

The "auto answer mode" is set ON along with the "silent mode" so that all incoming calls to the device are answered at the first ring
without the user's knowledge. This would allow the caller (investigator or owner) to hear the conversation (with outsiders) of the person
having the stolen device.

To trace the exact location of the lost device, the software informs the authorized owner about the location of the transmitting tower
under whose range the lost device is and the strength of the signal received by the device from the transmitting tower (which gives an
approximation of how far radially the device is located from the transmitting tower). Also a central server and another emergency
number will be intimidated in the form of an SMS message.

The received details from the stolen device are plotted on the related map of the available network towers and/or GPS information. The
Mapping system automatically detects these towers, service provider to the lost/stolen device and also the kind of connection (pre-
paid/post-paid) being used. With this data the location of the device can be calculated precisely. If the person holding the stolen/lost
device is moving, the rate at which he is moving, direction in which he is moving, etc. can also be seen on the map.

The device passes on information about all the available networks that are present in the vicinity of the device. Also the strength of the
signal received by each network is also shown. This helps in calculating the distance of the lost/stolen device from each of the towers in
the area. This information will be directly fed into the server for our retrieval. Also the time spent in a certain location can also be
calculated. This information can be viewed at the server end, and the movements of the person holding the device can be traced.

If the person holding the stolen device tries to bar the outgoing services by either deleting the "message center number" in the message
settings, then the software is intelligent enough to have a copy of the same in its backup. Thus the service can never be disabled. Similarly
if the "Fixed dialing mode" is set ON, then it is a must pre-requisite that all the emergency numbers must be assigned to the keys.

If the intelligent device realizes that the sending of sms'es is failing every time (due to nil balance or removal of message center number),
it will automatically communicate with the emergency numbers, which may be toll free ones also( for example: 100, 911, 112) in the
form of either messages or voice calls. The owner has an option to give one toll free number which connects to the device manufacturer
directly. These numbers have to be predefined by the authorized when he is customizing this application.

The security activation is carried out by a security activation element comprising an embedded in a Read Only (ROM) or a flash memory
of the device, with the auto re-install option, so that all attempts to delete the software component will go in vain.

Once the security mode has been enabled/activated, the security activation element keeps track of all the outgoing and incoming services
of the lost device and communicates the details. These details can then be provided to the investigating agency if need arises
To trace the lost device, the security activation element performs the following functions.
a) It reads the IMEI (International Mobile Equipment Identification Number), IMSI (International Mobile
Switching Identification) number and SIM (Subscribers Identity Module) card identity number (if available).
b) It indicates the current location of the missing device by giving details like the device number (changed or existing
one), name of the device (given by the authorized owner), the manufacturer, modem revision details, modem model number,
modem co-design and network service provider's tower in whose range the lost hand-set currently is.
c) It reads the strength of the signal that is being received by the lost device. This would help us in calculating the distance of
the lost device from the service provider's tower. It also gives the MCC (Mobile Country Code) and MNC (Mobile Network
Code) which tells us when the roaming facility is availed.
d) If the device is GPS compatible, along with above mentioned details, the latitudinal and longitudinal details are also
communicated. Also the speed (in kmph) at which the person holding the device is moving is sent.
e) It also tells us the status of the battery and whether it is in the process of getting charged currently.
f) Also the noise level (in dB) of his surroundings is captured and is sent.
g) It keeps a record of the outgoing calls, incoming calls, outgoing sms'es and incoming sms'es while the person who
has found the lost device continues using it.
h) The software tries to prompt the owner when the current user of the stolen device tries to switch it off.

The received information is processed and helps in tracing the exact location of the lost device. The details are sent to the emergency
numbers provided continuously so that the movements of the person holding the device can be traced and followed.

This security activation element works only on the device in which it has been installed. For this the element makes use of the Model
number of the device on which it is installed, the IMEI number and IMSI number.

Along with the above mentioned security element, a supplementary module is installed in the device. This supplement periodically
checks for the removal or attempts to destroy the main software module from memory. If it is detected that the software part of the
security activation element has been removed, it will immediately re-install the main security software module from a duplicate copy
that has been stored in the device at the time of installation.

Similarly the security activation element software module will periodically check if the supplementary software module has been
removed from memory. If yes, it will re-install the missing software module from the duplicate copy.

There is a provision in this security activation element that no one will be able to detect the presence of it in the device. It is only the
authorized owner of the mobile who knows that the software has been installed in his/her device.

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 5

In case the current user of the device attempts to switch it off or does so, this security element has provision to switch it on from a
remote source. Unless the battery has been removed, this method will not fail.

All services related to the emergency software activation and working will be automatically erased from the devices' history. Thus the
current user will not be aware of the transactions taking place without his knowledge. Also this security software module is named in a
cryptic manner for hiding its real identity in the device.

According to one of the embodiment of the invention a communication device finder system comprises;
 a transmitter-receiver for transmitting and receiving data in electronic connection with a microprocessor to process the data
received or to be transmitted and to a memory element to store the data;
 a keyboard or touch screen and optionally a mouse, connected to a dialer element, for entering the number to be dialed or an
alphanumeric short message (SMS) or a multimedia message (MMS);
 a display panel connected to the microprocessor for displaying alphanumeric characters, graphics and optionally video and/or
streaming video; a read-write element for reading and writing data from/to said memory element;
 an embedded or discrete subscriber identity module (SIM) for enabling wireless connection with a predetermined
telecommunication service provider network;
 optionally, elements for providing visual cues on said display panel and/or generating voice cues when said devices is
activated; wherein
 said device is provided with a security activation element for activating and bringing into auto-answer mode said
communication device finder though a telecommunication service provider network on being triggered by any other
designated communication device or through internet from a predetermined and designated internet protocol (IP) address or
on entering incorrect personal identification number (PIN) or password with or without changing said SIM, such that no visual
or voice cues accompany such activation, said security activation element comprising flash memory with auto reinstall option
set for auto reinstalling the data including the message center number when attempt is made to delete it and/or a non-
erasable read only memory (ROM) containing said data.

Claim:

i. A communication device finder system comprising: a transmitter-receiver (1) for transmitting and receiving data in electronic
connection with a microprocessor (2) to process the data received or to be transmitted and to a memory element to store the
data; a keyboard or touch screen (3) and optionally a mouse connected to a dialer element for entering the number to be
dialed or an alphanumeric short message (SMS) or a multimedia message (MMS); a display panel (4) connected to the
microprocessor (2) for displaying alphanumeric characters, graphics and optionally video and/or streaming video; a read- rite
element for reading and writing data from/to said memory element; an embedded or discrete subscriber identity module
(SIM) for enabling wireless connection with a predetermined telecommunication service provider network; optionally,
elements for providing visual cues on said display panel and/or generating voice cues when said device is activated;
characterized in that said device is provided with a security activation element (7) comprising a flash memory with auto
reinstall option set for auto re-installing data including message center number when attempt is made to delete it and/or a
non erasable read only memory (ROM) containing said data, wherein the said security activation element (7) is adapted for
activating and bringing into auto-answer mode said communication device finder through a telecommunication service
provider network on being triggered by any other designated communication device or through internet from a
predetermined and designated internet protocol (IP) address or on entering incorrect personal identification nu ober (PIN) or
password with or without changing SIM, such that no visual or voice cues accompany such activation.

ii. A communication device finder system as claimed in claim 1, wherein on activation said security activation element (7) is
programmed for sending a message to said designated communication device or designated IP address about location of
nearest three base station (BS) transmitting towers including mobile country code (MCC) and mobile network code (MNC) and
the strength of signal received by the device from each transmitting tower.

iii. A communication device finder system as claimed in claim 1, wherein on activation said security activation element (7) is
designed for enabling the device to send pre-recorded short messaging service (SMS) and/or multimedia messaging service
(MMS) and/or emails and optionally images and/or video captured by built-in Camera after said activation.

iv. A communication device finder system as claimed in claim 1, wherein said security activation element (7) on activation is
programmed for generating and playing voice messages and visual messages in the device.

v. A communication device finder system as claimed in claim 1, wherein said security activation element (7) on activation is
configured for copying, deleting and sending a copy of the phone book stored in memory of said system to said designated
device or IP address.

vi. A communication device finder system as claimed in claim 1, wherein said security activation element (7) on activation is
designed to automatically dial the conventional emergency numbers and such other numbers stored in the phone book.

vii. A communication device finder system as claimed in claim 1, wherein said security activation element (7) is designed for
getting triggered by a codified SMS received by said system from said designated device or IP address.

viii. A communication device finder system as claimed in claim 1, wherein on activation said security activation element (7) is
programmed for communicating details of all incoming and outgoing services of said system to the designated communication

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 6

device or IP address.

ix. A communication device finder system as claimed in claim 1, wherein on activation said security activation element (7) is
programmed to communicate latitudinal and longitudinal details to said designated communication device or IP address, if
said system is GPS compatible.

x. A communication device finder system as claimed in claim 1, wherein on activation said security activation element (7) is
programmed for reading one or more of details and sending the details to the designated communication device or IP address,
the details comprising international mobile equipment identification number(IPEI), international mobile switching
identification number (IMSI), subscriber identity module (SIM) card identity number, device electronic serial number (ESN),
name of the device, name of the manufacturer, modem revision details and modem model number.

xi. A communication device finder system as claimed in claim 1, wherein said device is selected from mobile phone, laptop,
palmtop, i-pod or a PDA.

xii. A communication device finder system as claimed in claim 1, wherein the telecommunication service provider is based on
WLL, GSM, CDMA or TDMA.

xiii. A communication device finder system such as herein described and illustrated with reference to the accompanying drawings.

Patent issued by:

Controller General of Patents, Designs & Trademarks


Dept. of Industrial Policy & Promotion
Ministry of Commerce & Industry
Govt. of INDIA



SYNERGY MULTITECH LIMITED


CIN: U72200TG1998PLC028678
Company Limited by Shares

Authorized Share Capital : Rs.20,000,000.00

Paid Up Capital : Rs.20,000,000.00

Date of Incorporation : 5th of January 1998

ROC : Hyderabad

State : Telangana

Registered Office Address : Plot No:75, Road No:10-C


New MLA & MP Colony,
Jubilee Hills, Hyderabad
Telangana, INDIA 500033

Last AGM : 27th of September, 2007

Last Balance Sheet : 31st of March, 2007

Registered Charges : Charge ID : 10140331


Date of Charge : 30th January, 2009
Charge Amount : Rs. 77 Million/ $ 1156764.84
Charge Holder : IDBI Bank Limited
Address : IDBI Tower, WTC Complex
Cuffe Parade, Mumbai
Maharashtra - 400005, INDIA

Noble Law Chambers attests the accuracy and integrity of this document.
Page | 7

List of Directors

Nutigattu Venkata Satyanarayana Papetlla Ravi Kanth Somana Bala Murali Krishna
S/o Nutigattu Venkata Ramana S/o Papetlla Srinivas Mohan S/o Somana Mallikharjuna Rao
Designation: Managing Director Designation: Marketing Director Designation: Managing Director
DoJ: 14/08/2000 DoJ: 24/08/2000 DoB: 19/03/1971
DoB: 15/08/1969 DoB: 09/03/1977 DIN: 00443553
DIN: 1719559 DIN: 0443472 DSC: Active
DSC: Active DSC: Inactive

OTHER COMPANIES OTHER COMPANIES OTHER COMPANIES


SYNERGY NETSOFT LIMITED. THIRD VISION TRACKING DEVICES PRIVATE LIMITED SYNERGY NETSOFT LIMITED.
L72200TG1993PLC015321 U74120TG2008PTC058451 L72200TG1993PLC015321
Director, From 29 June 2006 Director, From 28 June 2008 Director, From 29 June 2006

SERVOMAX ELECTRONICS PRIVATE LIMITED THIRD VISION SECURITY SYSTEMS LIMITED THIRD VISION TRACKING DEVICES PRIVATE LIMITED
U29248KA2013PTC071236 U74900TG2009PLC063371 U74120TG2008PTC058451
Additional Director, From 25 January 2014 Director, From 21 April 2009 Director, From 31 March 2008

THIRD VISION SECURITY SYSTEMS LIMITED THIRD VISION SECURITY SYSTEMS LIMITED
U74900TG2009PLC063371 U74900TG2009PLC063371
Director, From 21 April 2009 Director, From 21 April 2009

Pointer Elucidation by:

Vijay Vardhan Kudari


Corporate Legal Compliance
Noble Law Chambers
Hyderabad.
kudari@lawyer.com

Disclaimer:
The information in the in this document has been prepared by Noble Law Chambers LLP, Hyderabad with the assistance of Synergy Multitech
Limited. It is intended as a general guide to the stakeholders, Venture Capitalists and appointed Legal Representatives of Synergy Multitech
Limited. Its application to specific situations will depend on the particular circumstances involved. Accordingly, we recommend that readers
seek appropriate professional advice before taking any action. This information should not be relied upon as a substitute for such advice.
While all reasonable attempts have been made to ensure that the information contained herein is accurate, Synergy Multitech Limited
accepts no responsibility for any errors or omissions it may contain, whether caused by negligence or otherwise, or for any losses, however
caused, sustained by any person relying upon it.

Noble Law Chambers attests the accuracy and integrity of this document.

You might also like