Apparatus and method for determining a wireless device&#39;s location after shutdown

ABSTRACT

A wireless data processing device is described which periodically exits an unpowered state and transmits location data. For example, one embodiment of a wireless data processing device comprises: power circuitry for maintaining the wireless data processing device in a powered or unpowered state, the power circuitry causing the wireless data processing device to enter into an unpowered state responsive to user input; a timer to periodically power up the wireless device or portion thereof in response to reaching a predetermined time; a location services module determining a current location of the wireless data processing device using one or more specified location determination techniques; a transmit thread transmitting the current location of the wireless device over one or more specified communication channels; and the power circuitry powering down the wireless data processing device a second time after the current location has been transmitted.

BACKGROUND

1. Field of the Invention

This invention relates generally to the field of computer networking.More particularly, the invention relates to an improved apparatus andmethod for determining a wireless device's location after shutdown.

2. Description of Related Art

Current security features in handheld and portable products allow thelocation of the product to be identified when requested by the user,such as in instances where the product is lost or stolen. However, thistechnology is limited in cases where the product has been lost/stolenand subsequently switched off (i.e., to an unpowered state). Theembodiments of the invention described below add an additional layer ofsecurity to locate devices in these situations.

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the present invention can be obtained from thefollowing detailed description in conjunction with the followingdrawings, in which:

FIG. 1A illustrates one embodiment of the invention for determining awireless device's location after power down.

FIG. 1B illustrates another embodiment of the invention for determininga wireless device's location after shutdown.

FIG. 2 illustrates one embodiment of a method for determining a wirelessdevice's location after shut-down.

FIG. 3 illustrates an application programming interface employed in oneembodiment of the invention.

FIG. 4 illustrates exemplary applications interfacing to services andoperating systems in accordance with one embodiment of the invention.

FIG. 5 illustrates an architecture of a data processing device on whichembodiments of the invention may be implemented.

FIG. 6 illustrates another architecture of a data processing device onwhich embodiments of the invention may be implemented.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Described below are embodiments of an apparatus, method, andmachine-readable medium for establishing, maintaining and utilizingprimary and/or backup peer-to-peer (“P2P”) communication channels on anetwork. An invitation service and a matchmaker service are alsodescribed for inviting users and matching users, respectively, for P2Psessions. Additionally, a relay service is described to allow users toestablish relay connections under certain specified conditions. Finally,an application framework and associated application programminginterface (API) are described to allow application developers to designapplications which take advantage of various collaborative onlinefeatures described herein.

Throughout the description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. It will be apparent, however, toone skilled in the art that the present invention may be practicedwithout some of these specific details. In other instances, well-knownstructures and devices are not shown or are shown in a block diagramform to avoid obscuring the underlying principles of the presentinvention.

Apparatus and Method for Determining a Wireless Device's Location afterShutdown

The embodiments of the invention described below allow wireless devicessuch as the iPad® or iPhone® (designed by the assignee of the presentapplication) to automatically turn back on, send their locationinformation, and turn off again after being initially shut down. In oneembodiment of the invention, the software or hardware activates duringthe power-down sequence for the wireless device (such as after holdingthe Lock and Home buttons on an iPhone and entering the power-downscreen) where an option appears to either enter a shutdown security codeto disable the location security features before shutdown, or to bypassthe code and activate the features during shutdown. In one embodiment,failing to enter the correct code after a specified number of attemptsautomatically activates the security features described herein and shutsdown the wireless device.

In one embodiment, when activated, the device's current location isperiodically transmitted over a designated set of communication channels(e.g., email, a designated network address, a text message, etc) and thedevice thereafter powers down until it is time for the nexttransmission. The frequency with which the device's current location istransmitted may be specified by the end user or may be set automaticallyin the software/firmware. The end user may also be provided with theoption to disable the features described herein. In one embodiment, thelocation transmissions continue until the security code is properlyentered when the unit is manually powered up by a user, and/or when thecode is entered during one of the automatic power-ups.

FIG. 1A illustrates one embodiment of a mobile device 120 which includesa location services module 105 for determining a current location of themobile device (e.g., using a global positioning system (GPS) signal110); a transmit thread 106 for periodically transmitting the mobiledevice's location; and a timer module 107 for periodically waking thetransmit thread 106. As indicated, the timer 107 may be programmed towake the transmit thread 106 with a frequency configured by the end user112. In one embodiment, a security component 114 of the device'soperating system 104 manages the security code required to disable theperiodic transmissions and activates the transmit thread 106 and timer107 until the correct security code has been entered. In thisembodiment, the OS 104 and all of the system components 105-107 areimplemented as software executed by the mobile device's processor 100.

Once operational after a device power down, the timer 107 periodicallywakes the transmit thread 106. The transmit thread 106 then retrievesthe current location of the mobile device 120 from the location servicesmodule 105 and transmits the current location over one or morecommunication channels 155 via a wireless transceiver 150. In oneembodiment, the communication channels (which may also be specified bythe end user) include an email address 150, instant messaging address151, short message service (SMS) message 152, and/or a server address153.

For example, if email is used, the device's current location is storedwithin the subject line or body of an email and sent to a user-specifiedemail address. If instant messaging is used, the device 120 mayautomatically log into an instant messaging service (specified by theuser) and transmit an instant message to the user's IM account. If SMSis used, the transmit thread may invoke the SMS application on themobile device 120 to transmit an SMS message to a designated phonenumber. If a server address is used, the transmit thread will send thedevice's current location to the server (e.g., to a specific uniformresource locator (URL)) using a pre-specified communication format(e.g., such as an XML document). The user may log in to the server usingan alternate wireless device or computer to determine the mobiledevice's current location. Alternatively, the server may push thedevice's current location out to the user's alternate wireless device orcomputer.

In another embodiment of the invention, illustrated in FIG. 1B, thelocation services module 115, broadcast module 116, timer module 117 andsecurity module 124 are all implemented as hardware (e.g., as additionalcircuitry and/or firmware within the mobile device's processor 110, orusing separate support circuitry). Aside from the fact that they areimplemented in hardware, the functions performed by these modules115-117, 124 is the same as described above with respect to FIG. 1A.Various additional or alternate implementations are contemplated.

In one embodiment, when the mobile device 120 turns on to send locationinformation, the device will not revert to a fully powered state. Forexample, the display of the device may remain off. In addition, onlythose hardware and/or software components required to implement thefeatures described herein may be activated (to save battery power). Forexample, in the software implementation shown in FIG. 1A, only thosecomponents of the operating system 104 required to execute the locationservices module 105, transmit thread 106 and timer 107 may be executed.In the hardware implementation shown in FIG. 1B, only the firmware andcircuitry required to determine the device's current location andtransmit that location information over a communication channel may beactivated (e.g., such as the cellular or WiFi radio).

In one embodiment, a special graphic may be displayed on the mobiledevice's display to indicate that periodic location transmissions areoccurring. Alternatively, the display may remain off while the device istransmitting its location. Additionally, an option may be providedallowing the user to enter the shutdown code and disable the securityfeatures. In one embodiment, when the code is entered the screen canturn on to show that the location security service has been properlydisabled.

The shutdown code may be the same or different from the normal unlockcode for the mobile device 120. The code may be numeric oralpha-numeric, a mechanical code (a specific sequence of buttonpresses), a touchscreen code (draw a pattern on the touchscreen eitherwith or without visual cues), a voice activated code, or a camera codethat involves taking a picture of a QR code/2D barcode or 1D barcode. Inone embodiment, the security features described above may be disabled bytaking a picture of an object while the mobile device is in a particularorientation relative to the onboard compass.

Additionally, a two-part or multi-part authentication may beimplemented. During the first authentication stage the screen may remainoff, remain on but offer no cues, or a graphic may be displayed to enterthe code. After the first authentication is complete the unit mayrequest the second authentication (e.g., by turning on the display anddisplaying a graphic, vibrating, turning on the camera if a QR code isrequired, or having a voice prompt you over a speaker).

In one embodiment, the techniques described herein may be used incombination with hardware and/or software which performs ‘remote wipes’on mobile devices. For example, in one embodiment, the mobile device 120logs into an authorization server when it wakes up. The authorizationserver may then instruct the remote device to delete all user sensitivedata (if previously instructed to do so by the end user) or to disablethe security software described herein. The mobile device 120 may alsocheck for authorization from the user when it automatically powers onand sends its location. The user may then remotely disable the securitysoftware or change the frequency the unit sends its locationinformation.

While some embodiments described above provide a visual indication thata code is required, in one embodiment, no visual indication is providedto avoid alerting parties that the unit will be tracked after being shutdown. When an incorrect code is entered the wireless device may remainin a sub-state with the display turned off (instead of shutting downcompletely) but with the wireless device still sending locationinformation and the ability to enter the correct code. The wirelessdevice may remain in this sub-state either continually or may be set topower on and enter this sub-state at specific time periods (such as thefirst 5-10 minutes of every hour). The software/hardware describedherein may lock out the device for a specific amount of time after aspecific number of failed unlock attempts, and may also be configured towipe user-sensitive data (or all data) after a specific number of failedunlock attempts.

In one embodiment, information may be collected to supplement thelocation data. For example, the camera(s) of the device may beconfigured to automatically snap a picture and transmit the picture overone or more of the communication channels. In one embodiment, the mobiledevice is configured to send out its final location and IP address ofthe computer it is attached to just prior to a master reset (i.e., whenthe security software is still activated).

One embodiment of a method for transmitting a wireless device's locationafter power down is illustrated in FIG. 2. At 201, a timer andcommunication channels over which to transmit are programmed based onuser input. For example, the user may specify that the device shouldwake up and transmit a location message over email and to a server every15 minutes after being powered down. At 202, after the device is powereddown, the timer generates a wakeup signal to wake up the transmit threadand radio transceiver. At 203, the transmit thread determines itscurrent location (e.g., from the location services module 115) and, at204, the transmit thread transmits its current location over thespecified communication channels.

One embodiment of the invention utilizes radio frequency identification(RFID) and/or near field technology (NFC) as a “honing” to locatedevices at higher resolutions. For example, in one embodiment, otherdevices (not shown) may use RFID and/or NFC to communicate with andidentify the mobile device 120 and then transmit the identity of themobile device 120 over one or more of the communication channels 155.The mobile device 120 of this embodiment does not need to fully powerall of the components illustrated in FIG. 1B, thereby allowing thedevice to be located when its battery is drained.

In addition to location data, one embodiment of the invention transmitshardware-specific serial numbers encoded with user information (e.g., sothe server can identify the user to communicate the location informationwith). Additionally, the above concepts may also be used to activatecertain parts of the system to make it easier to locate the mobiledevice 120. For example, using RFID/NFC, a hardware signal can beactivated to enable the audio portion of the system to help locate thedevice (e.g., by generating an audio signal from the mobile device 120or the other devices communicating using RFID/NFC).

Different API Embodiments

Different embodiments described herein include an applicationprogramming interface (API) implemented by a software component(hereinafter “API implementing software component”) that allows adifferent software component (hereinafter “API calling softwarecomponent”) to access and use one or more functions, methods,procedures, data structures, and/or other services provided by the APIimplementing software component. For example, an API allows a developerof an API calling software component (which may be a third partydeveloper) to leverage specified features provided by an APIimplementing software component. There may be one API calling softwarecomponent or there may be more than one such software component. An APIcan be a source code interface that a computer system or program libraryprovides in order to support requests for services from a softwareapplication. An API can be specified in terms of a programming languagethat can be interpretative or compiled when an application is built,rather than an explicit low level description of how data is laid out inmemory.

The API defines the language and parameters that API calling softwarecomponents use when accessing and using specified features of the APIimplementing software component. For example, an API calling softwarecomponent accesses the specified features of the API implementingsoftware component through one or more API calls (sometimes referred toas function or method calls) exposed by the API. The API implementingsoftware component may return a value through the API in response to anAPI call from an API calling software component. While the API definesthe syntax and result of an API call (e.g., how to invoke the API calland what the API call does), the API typically does not reveal how theAPI call accomplishes the function specified by the API call. Variousfunction calls or messages are transferred via the one or moreapplication programming interfaces between the calling software (APIcalling software component) and an API implementing software component.Transferring the function calls or messages may include issuing,initiating, invoking, calling, receiving, returning, or responding tothe function calls or messages. Hence, an API calling software componentcan transfer a call and an API implementing software component cantransfer a call.

By way of example, the API implementing software component 2010 and theAPI calling software component may be an operating system, a library, adevice driver, an API, an application program, or other software module(it should be understood that the API implementing software componentand the API calling software component may be the same or different typeof software module from each other). The API calling software componentmay be a local software component (i.e., on the same data processingsystem as the API implementing software component) or a remote softwarecomponent (i.e., on a different data processing system as the APIimplementing software component) that communicates with the APIimplementing software component through the API over a network. Itshould be understood that an API implementing software component mayalso act as an API calling software component (i.e., it may make APIcalls to an API exposed by a different API implementing softwarecomponent) and an API calling software component may also act as an APIimplementing software component by implementing an API that is exposedto a different API calling software component.

The API may allow multiple API calling software components written indifferent programming languages to communicate with the API implementingsoftware component (thus the API may include features for translatingcalls and returns between the API implementing software component andthe API calling software component); however the API may be implementedin terms of a specific programming language.

FIG. 3 illustrates one embodiment of an API architecture which includesan API implementing software component 310 (e.g., an operating system, alibrary, a device driver, an API, an application program, or othersoftware module) that implements the API 320. The API 320 specifies oneor more functions, methods, classes, objects, protocols, datastructures, formats and/or other features of the API implementingsoftware component that may be used by the API calling softwarecomponent 330. The API 320 can specify at least one calling conventionthat specifies how a function in the API implementing software componentreceives parameters from the API calling software component and how thefunction returns a result to the API calling software component. The APIcalling software component 330 (e.g., an operating system, a library, adevice driver, an API, an application program, or other softwaremodule), makes API calls through the API 320 to access and use thefeatures of the API implementing software component 310 that arespecified by the API 320. The API implementing software component 310may return a value through the API 320 to the API calling softwarecomponent 330 in response to an API call.

It will be appreciated that the API implementing software component 310may include additional functions, methods, classes, data structures,and/or other features that are not specified through the API 320 and arenot available to the API calling software component 330. It should beunderstood that the API calling software component 330 may be on thesame system as the API implementing software component 310 or may belocated remotely and accesses the API implementing software component310 using the API 320 over a network. While FIG. 3 illustrates a singleAPI calling software component 330 interacting with the API 320, itshould be understood that other API calling software components, whichmay be written in different languages (or the same language) than theAPI calling software component 330, may use the API 320.

The API implementing software component 310, the API 320, and the APIcalling software component 330 may be stored in a machine-readablemedium, which includes any mechanism for storing information in a formreadable by a machine (e.g., a computer or other data processingsystem). For example, a machine-readable medium includes magnetic disks,optical disks, random access memory; read only memory, flash memorydevices, etc.

In FIG. 4 (“Software Stack”), an exemplary embodiment, applications canmake calls to Services 1 or 2 using several Service APIs and toOperating System (OS) using several OS APIs. Services 1 and 2 can makecalls to OS using several OS APIs.

Note that the Service 2 has two APIs, one of which (Service 2 API 1)receives calls from and returns values to Application 1 and the other(Service 2 API 2) receives calls from and returns values to Application2. Service 1 (which can be, for example, a software library) makes callsto and receives returned values from OS API 1, and Service 2 (which canbe, for example, a software library) makes calls to and receivesreturned values from both OS API 1 and OS API 2. Application 2 makescalls to and receives returned values from OS API 2.

Exemplary Data Processing Devices

FIG. 5 is a block diagram illustrating an exemplary computer systemwhich may be used in some embodiments of the invention. It should beunderstood that while FIG. 5 illustrates various components of acomputer system, it is not intended to represent any particulararchitecture or manner of interconnecting the components as such detailsare not germane to the present invention. It will be appreciated thatother computer systems that have fewer components or more components mayalso be used with the present invention.

As illustrated in FIG. 5, the computer system 500, which is a form of adata processing system, includes the bus(es) 550 which is coupled withthe processing system 520, power supply 525, memory 530, and thenonvolatile memory 540 (e.g., a hard drive, flash memory, Phase-ChangeMemory (PCM), etc.). The bus(es) 550 may be connected to each otherthrough various bridges, controllers, and/or adapters as is well knownin the art. The processing system 520 may retrieve instruction(s) fromthe memory 530 and/or the nonvolatile memory 540, and execute theinstructions to perform operations as described above. The bus 550interconnects the above components together and also interconnects thosecomponents to the optional dock 560, the display controller & displaydevice 570, Input/Output devices 580 (e.g., NIC (Network InterfaceCard), a cursor control (e.g., mouse, touchscreen, touchpad, etc.), akeyboard, etc.), and the optional wireless transceiver(s) 590 (e.g.,Bluetooth, WiFi, Infrared, etc.).

FIG. 6 is a block diagram illustrating an exemplary data processingsystem which may be used in some embodiments of the invention. Forexample, the data processing system 600 may be a handheld computer, apersonal digital assistant (PDA), a mobile telephone, a portable gamingsystem, a portable media player, a tablet or a handheld computing devicewhich may include a mobile telephone, a media player, and/or a gamingsystem. As another example, the data processing system 600 may be anetwork computer or an embedded processing device within another device.

According to one embodiment of the invention, the exemplary architectureof the data processing system 600 may used for the mobile devicesdescribed above. The data processing system 600 includes the processingsystem 620, which may include one or more microprocessors and/or asystem on an integrated circuit. The processing system 620 is coupledwith a memory 610, a power supply 625 (which includes one or morebatteries) an audio input/output 640, a display controller and displaydevice 660, optional input/output 650, input device(s) 670, and wirelesstransceiver(s) 630. It will be appreciated that additional components,not shown in FIG. 6, may also be a part of the data processing system600 in certain embodiments of the invention, and in certain embodimentsof the invention fewer components than shown in FIG. 6 may be used. Inaddition, it will be appreciated that one or more buses, not shown inFIG. 6, may be used to interconnect the various components as is wellknown in the art.

The memory 610 may store data and/or programs for execution by the dataprocessing system 600. The audio input/output 640 may include amicrophone and/or a speaker to, for example, play music and/or providetelephony functionality through the speaker and microphone. The displaycontroller and display device 660 may include a graphical user interface(GUI). The wireless (e.g., RF) transceivers 630 (e.g., a WiFitransceiver, an infrared transceiver, a Bluetooth transceiver, awireless cellular telephony transceiver, etc.) may be used tocommunicate with other data processing systems. The one or more inputdevices 670 allow a user to provide input to the system. These inputdevices may be a keypad, keyboard, touch panel, multi touch panel, etc.The optional other input/output 650 may be a connector for a dock.

Embodiments of the invention may include various steps as set forthabove. The steps may be embodied in machine-executable instructionswhich cause a general-purpose or special-purpose processor to performcertain steps. Alternatively, these steps may be performed by specifichardware components that contain hardwired logic for performing thesteps, or by any combination of programmed computer components andcustom hardware components.

Elements of the present invention may also be provided as amachine-readable medium for storing the machine-executable program code.The machine-readable medium may include, but is not limited to, floppydiskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs,RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other type ofmedia/machine-readable medium suitable for storing electronic programcode.

Throughout the foregoing description, for the purposes of explanation,numerous specific details were set forth in order to provide a thoroughunderstanding of the invention. It will be apparent, however, to oneskilled in the art that the invention may be practiced without some ofthese specific details. For example, it will be readily apparent tothose of skill in the art that the functional modules and methodsdescribed herein may be implemented as software, hardware or anycombination thereof. Moreover, although embodiments of the invention aredescribed herein within the context of a mobile computing environment(i.e., using mobile devices 120-123; 601-603), the underlying principlesof the invention are not limited to a mobile computing implementation.Virtually any type of client or peer data processing devices may be usedin some embodiments including, for example, desktop or workstationcomputers. Accordingly, the scope and spirit of the invention should bejudged in terms of the claims which follow.

We claim:
 1. A computer implemented method for automaticallytransmitting a location of a wireless data processing device, the methodcomprising: determining that an incorrect security code to unlock thewireless data processing device has been entered a specified number oftimes, and based on the determination powering down the wireless dataprocessing device; temporarily powering up the wireless data processingdevice or portion thereof, in a security mode, in response to reaching apredetermined time, wherein the security mode includes activatingdesignated security features, the designated security features includinglimiting user access to the wireless data processing device; in thesecurity mode, determining a current location of the wireless dataprocessing device using one or more specified location determinationtechniques; in the security mode, transmitting the current location ofthe wireless data processing device over one or more specifiedcommunication channels; and powering down the wireless data processingdevice after the current location has been transmitted.
 2. The method asin claim 1 wherein the wireless data processing device is powered up ina limited capacity solely to transmit the current location of thewireless data processing device.
 3. The method as in claim 2 wherein thelimited capacity comprises powering a wireless radio and one or moresoftware modules for determining and transmitting the current locationof the wireless data processing device.
 4. The method as in claim 1wherein determining the current location comprises receiving andprocessing a global positioning system (GPS) signal with GPS logic. 5.The method as in claim 1 wherein one of the specified communicationchannels comprises at least one of a server address to which thewireless data processing device transmits the current location, an emailaddress to which the wireless data processing device transmits thecurrent location in an email message, a short message service (SMS)communication channel to which the wireless data processing devicetransmits the current location, or an instant message in which thewireless data processing device transmits the current location.
 6. Themethod as in claim 1 further comprising: upon initially powering downthe wireless data processing device, providing a user an option to entera security code; and performing the remaining operations of the methodonly if the security code is not entered.
 7. A wireless data processingdevice comprising: a power supply, including circuitry, coupled to aprocessing system of the wireless data processing device for maintainingthe wireless data processing device in a powered or unpowered state, theprocessing system causing the wireless data processing device to enterinto an unpowered state responsive to user input, wherein the user inputcomprises entering an incorrect security code to unlock the wirelessdata processing device for a specified number of times; a timer toperiodically power up the wireless data processing device or portionthereof, in a security mode, in response to reaching a predeterminedtime, wherein the security mode includes activating designated securityfeatures, the designated security features including limiting useraccess to the wireless data processing device; a location servicesmodule, coupled to the processing system, to determine a currentlocation of the wireless data processing device, in the security mode,using one or more specified location determination techniques; atransmitter to transmit the current location of the wireless dataprocessing device, in the security mode, over one or more specifiedcommunication channels; and the processing system powering down thewireless data processing device after the current location has beentransmitted.
 8. The wireless data processing device as in claim 7wherein the wireless data processing device is powered up in a limitedcapacity solely to transmit the current location of the wireless dataprocessing device.
 9. The wireless data processing device as in claim 8wherein the limited capacity comprises powering a wireless radio and oneor more software modules for determining and transmitting the currentlocation of the wireless data processing device.
 10. The wireless dataprocessing device as in claim 7 wherein determining the current locationcomprises receiving and processing a global positioning system (GPS)signal with GPS logic.
 11. The wireless data processing device as inclaim 7 wherein one of the specified communication channels comprises atleast one of a server address to which the wireless data processingdevice transmits the current location, an email address to which thewireless data processing device transmits the current location in anemail message, a short message service (SMS) communication channel towhich the wireless data processing device transmits the currentlocation, or an instant message in which the wireless data processingdevice transmits the current location.
 12. The wireless data processingdevice as in claim 7 further comprising: security logic which, uponinitially powering down the wireless data processing device, provides auser an option to enter a security code; and wherein the transmittertransmits the wireless data processing device's location only if thesecurity code is not entered.
 13. A computer implemented method forautomatically transmitting a location of a wireless data processingdevice after the wireless data processing device has been powered down,the method comprising: determining the wireless data processing devicehas been powered down for a predetermined period of time; temporarilypowering up the wireless data processing device or portion thereof, in asecurity mode, in response to reaching the predetermined period of time,the security mode includes activating designated security features, thedesignated security features including limiting user access to thewireless data processing device; determining, in the security mode, acurrent location of the wireless data processing device using one ormore specified location determination techniques; transmitting, in thesecurity mode, the current location of the wireless data processingdevice over one or more specified communication channels; and poweringdown the wireless data processing device after the current location hasbeen transmitted, while remaining in the security mode.
 14. The methodof claim 13, wherein the wireless data processing device or a portionthereof temporarily powers up in the security mode in response toreaching the predetermined period of time based on a configurationsetting of the wireless data processing device.
 15. The method of claim14, wherein the configuration setting is configurable by the user. 16.The method of claim 15 wherein the configuration setting includes asetting to enable or disable the temporarily powering up of the wirelessdata processing device or a portion thereof, in response to reaching thepredetermined period of time.
 17. A computer readable non-transitorystorage medium comprising executable instructions which, when executedby a processing system of a wireless data processing device performs amethod of claim
 13. 18. The method of claim 13 wherein one of thespecified communication channels comprises at least one of a serveraddress to which the wireless data processing device transmits thecurrent location, an email address to which the wireless data processingdevice transmits the current location in an email message, a shortmessage service (SMS) communication channel to which the wireless dataprocessing device transmits the current location, or an instant messagein which the wireless data processing device transmits the currentlocation.
 19. The method as in claim 13 wherein the wireless dataprocessing device is temporarily powered up in a limited capacity solelyto transmit the current location of the wireless data processing device.20. The method as in claim 19 wherein the limited capacity comprisespowering a wireless radio and one or more software modules fordetermining and transmitting the current location of the wireless dataprocessing device.