Apparatus and method for determining a wireless device&#39;s location after shutdown

ABSTRACT

A wireless data processing device is described which periodically exits an unpowered state and transmits location data. For example, one embodiment of a wireless data processing device comprises: power circuitry for maintaining the wireless data processing device in a powered or unpowered state, the power circuitry causing the wireless data processing device to enter into an unpowered state responsive to user input; a timer to periodically power up the wireless device or portion thereof in response to reaching a predetermined time; a location services module determining a current location of the wireless data processing device using one or more specified location determination techniques; a transmit thread transmitting the current location of the wireless device over one or more specified communication channels; and the power circuitry powering down the wireless data processing device a second time after the current location has been transmitted.

This application is a continuation of co-pending U.S. application Ser.No. 14/327,039 filed on Jul. 9, 2014, which is a continuation of U.S.application Ser. No. 13/454,014 filed on Apr. 23, 2012, now issued asU.S. Pat. No. 8,849,303.

BACKGROUND

1. Field of the Invention

This invention relates generally to the field of computer networking.More particularly, the invention relates to an improved apparatus andmethod for determining a wireless device's location after shutdown.

2. Description of Related Art

Current security features in handheld and portable products allow thelocation of the product to be identified when requested by the user,such as in instances where the product is lost or stolen. However, thistechnology is limited in cases where the product has been lost/stolenand subsequently switched off (i.e., to an unpowered state). Theembodiments of the invention described below add an additional layer ofsecurity to locate devices in these situations.

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the present invention can be obtained from thefollowing detailed description in conjunction with the followingdrawings, in which:

FIG. 1 illustrates one embodiment of the invention for determining awireless device's location after power down.

FIG. 1B illustrates another embodiment of the invention for determininga wireless device's location after shutdown.

FIG. 2 illustrates one embodiment of a method for determining a wirelessdevice's location after shut-down.

FIG. 3 illustrates an application programming interface employed in oneembodiment of the invention.

FIG. 4 illustrates exemplary applications interfacing to services andoperating systems in accordance with one embodiment of the invention.

FIG. 5 illustrates an architecture of a data processing device on whichembodiments of the invention may be implemented.

FIG. 6 illustrates another architecture of a data processing device onwhich embodiments of the invention may be implemented.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Described below are embodiments of an apparatus, method, andmachine-readable medium for establishing, maintaining and utilizingprimary and or backup peer-to-peer (“P2P”) communication channels on anetwork. An invitation service and a matchmaker service are alsodescribed for inviting users and matching users, respectively, for P2Psessions. Additionally, a relay service is described to allow users toestablish relay connections under certain specified conditions. Finally,an application framework and associated application programminginterface (API) are described to allow application developers to designapplications which take advantage of various collaborative onlinefeatures described herein.

Throughout the description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. It will be apparent, however, toone skilled in the art that the present invention may be practicedwithout some of these specific details. In other instances, well-knownstructures and devices are not shown or are shown in a block diagramform to avoid obscuring the underlying principles of the presentinvention.

Apparatus and Method for Determining a Wireless Device's Location AfterShutdown

The embodiments of the invention described below allow wireless devicessuch as the iPad® or iPhone® (designed by the assignee of the presentapplication) to automatically turn back on, send their locationinformation, and turn off again after being initially shut down. In oneembodiment of the invention, the software or hardware activates duringthe power-down sequence for the wireless device (such as after holdingthe Lock and Home buttons on an iPhone and entering the power-downscreen) where an option appears to either enter a shutdown security codeto disable the location security features before shutdown, or to bypassthe code and activate the features during shutdown. In one embodiment,failing to enter the correct code after a specified number of attemptsautomatically activates the security features described herein and shutsdown the wireless device.

In one embodiment, when activated, the device's current location isperiodically transmitted over a designated set of communication channels(e.g., email, a designated network address, a text message, etc) and thedevice thereafter powers down until it is time for the nexttransmission. The frequency with which the device's current location istransmitted may be specified by the end user or may be set automaticallyin the software/firmware. The end user may also be provided with theoption to disable the features described herein. In one embodiment, thelocation transmissions continue until the security code is properlyentered when the unit is manually powered up by a user, and/or when thecode is entered during one of the automatic power-ups.

FIG. 1A illustrates one embodiment of a mobile device 120 which includesa location services module 105 for determining a current location of themobile device (e.g., using a global positioning system (GPS) signal110); a transmit thread 106 for periodically transmitting the mobiledevice's location; and a timer module 107 for periodically waking thetransmit thread 106. As indicated, the timer 107 may be programmed towake the transmit thread 106 with a frequency configured by the end user112. In one embodiment, a security component 114 of the device'soperating system 104 manages the security code required to disable theperiodic transmissions and activates the transmit thread 106 and timer107 until the correct security code has been entered. In thisembodiment, the OS 104 and all of the system components 105-407 areimplemented as software executed by the mobile device's processor 100.

Once operational after a device power down, the timer 107 periodicallywakes the transmit thread 106. The transmit thread 106 then retrievesthe current location of the mobile device 120 from the location servicesmodule 105 and transmits the current location over one or morecommunication channels 155 via a wireless transceiver 130. In oneembodiment, the communication channels (which may also be specified bythe end user) include an email address 150, instant messaging address151, short message service (SMS) message 152, and/or a server address153.

For example, if email is used, the device's current location is storedwithin the subject line or body of an email and sent to a user-specifiedemail address. If instant messaging is used, the device 120 mayautomatically log into an instant messaging service (specified by theuser) and transmit an instant message to the user's IM account. If SMSis used, the transmit thread may invoke the SMS application on themobile device 120 to transmit an SMS message to a designated phonenumber. If a server address is used, the transmit thread will send thedevice's current location to the server (e.g., to a specific uniformresource locator (URL)) using a pre-specified communication format(e.g., such as an XML document). The user may log in to the server usingan alternate wireless device or computer to determine the mobiledevice's current location. Alternatively, the server may push thedevice's current location out to the user's alternate wireless device orcomputer.

In another embodiment of the invention, illustrated in FIG. 1B, thelocation services module 115, broadcast module 116, timer module 117 andsecurity module 124 are all implemented as hardware (e.g., as additionalcircuitry and/or firmware within the mobile device's processor 100, orusing separate support circuitry). Aside from the fact that they areimplemented in hardware, the functions performed by these modules115-117, 124 is the same as described above with respect to FIG. 1A.Various additional or alternate implementations are contemplated.

In one embodiment, when the mobile device 120 turns on to send locationinformation, the device will not revert to a fully powered state. Forexample, the display of the device may remain of In addition, only thosehardware and/or software components required to implement the featuresdescribed herein may be activated (to save battery power). For example,in the software implementation shown in FIG. 1A, only those componentsof the operating system 104 required to execute the location servicesmodule 105, transmit thread 106 and timer 107 may be executed. In thehardware implementation shown in FIG. 1B, only the firmware andcircuitry required to determine the device's current location andtransmit that location information over a communication channel may beactivated (e.g., such as the cellular or WiFi radio).

In one embodiment, a special graphic may be displayed on the mobiledevice's display to indicate that periodic location transmissions areoccurring. Alternatively, the display may remain off while the device istransmitting its location. Additionally, an option may be providedallowing the user to enter the shutdown code and disable the securityfeatures. In one embodiment, when the code is entered the screen canturn on to show that the location security service has been properlydisabled.

The shutdown code may be the same or different from the normal unlockcode for the mobile device 120. The code may be numeric oralpha-numeric, a mechanical code (a specific sequence of buttonpresses), a touchscreen code (draw a pattern on the touchscreen eitherwith or without visual cues), a voice activated code, or a camera codethat involves taking a picture of a QR code/2D barcode or 1D barcode. Inone embodiment, the security features described above may be disabled bytaking a picture of an object while the mobile device is in a particularorientation relative to the onboard compass.

Additionally, a two-part or multi-part authentication may beimplemented. During the first authentication stage the screen may remainoff, remain on but offer no cues, or a graphic may be displayed to enterthe code. After the first authentication is complete the unit mayrequest the second authentication (e.g., by turning on the display anddisplaying a graphic, vibrating, turning on the camera if a QR code isrequired, or having a voice prompt you over a speaker).

In one embodiment, the techniques described herein may be used incombination with hardware and/or software which performs ‘remote wipes’on mobile devices. For example, in one embodiment, the mobile device 120logs into an authorization server when it wakes up. The authorizationserver may then instruct the remote device to delete all user sensitivedata (if previously instructed to do so by the end user) or to disablethe security software described herein. The mobile device 120 may alsocheck for authorization from the user when it automatically powers onand sends its location. The user may then remotely disable the securitysoftware or change the frequency the unit sends its locationinformation.

While some embodiments described above provide a visual indication thata code is required, in one embodiment, no visual indication is providedto avoid alerting parties that the unit will be tracked after being shutdown. When an incorrect code is entered the wireless device may remainin a sub-state with the display turned off (instead of shutting downcompletely) but with the wireless device still sending locationinformation and the ability to enter the correct code. The wirelessdevice may remain in this sub-state either continually or may be set topower on and enter this sub-state at specific time periods (such as thefirst 5-10 minutes of every hour). The software/hardware describedherein may lock out the device for a specific amount of time after aspecific number of failed unlock attempts, and may also be configured towipe user-sensitive data (or all data) after a specific number of failedunlock attempts.

In one embodiment, information may be collected to supplement thelocation data. For example, the camera(s) of the device may beconfigured to automatically snap a picture and transmit the picture overone or more of the communication channels. In one embodiment, the mobiledevice is configured to send out its final location and IP address ofthe computer it is attached to just prior to a master reset (i.e., whenthe security software is still activated).

One embodiment of a method for transmitting a wireless device's locationafter power down is illustrated in FIG. 2. At 201, a tinier andcommunication channels over which to transmit are programmed based onuser input. For example, the user may specify that the device shouldwake up and transmit a location message over email and to a server every15 minutes after being powered down. At 202, after the device is powereddown, the timer generates a wakeup signal to wake up the transmit threadand radio transceiver. At 203, the transmit thread determines itscurrent location (e.g., from the location services module 115) and, at204, the transmit thread transmits its current location over thespecified communication channels.

One embodiment of the invention utilizes radio frequency identification(RFID) and/or near field technology (NFC) as a “honing” to locatedevices at higher resolutions. For example, in one embodiment, otherdevices (not shown) may use RFID and/or NFC to communicate with andidentify the mobile device 120 and then transmit the identity of themobile device 120 over one or more of the communication channels 155.The mobile device 120 of this embodiment does not need to fully powerall of the components illustrated in FIG. 1B, thereby allowing thedevice to be located when its battery is drained.

In addition to location data, one embodiment of the invention transmitshardware-specific serial numbers encoded with user information (e.g., sothe server can identify the user to communicate the location informationwith). Additionally, the above concepts may also be used to activatecertain parts of the system to make it easier to locate the mobiledevice 120. For example, using RFID/NFC, a hardware signal can beactivated to enable the audio portion of the system to help locate thedevice (e.g., by generating an audio signal from the mobile device 120or the other devices communicating using RFID/NFC).

Different API Embodiments

Different embodiments described herein include an applicationprogramming interface (API) implemented by a software component(hereinafter “API implementing software component”) that allows adifferent software component (hereinafter “API calling softwarecomponent”) to access and use one or more functions, methods,procedures, data structures, and/or other services provided by the APIimplementing software component. For example, an API allows a developerof an API calling software component (which may be a third partydeveloper) to leverage specified features provided by an APIimplementing software component. There may be one API calling softwarecomponent or there may be more than one such software component. An APIcan be a source code interface that a computer system or program libraryprovides in order to support requests for services from a softwareapplication. An API can be specified in terms of a programming languagethat can be interpretative or compiled when an application is built,rather than an explicit low level description of how data is laid out inmemory.

The API defines the language and parameters that API calling softwarecomponents use when accessing and using specified features of the APIimplementing software component. For example, an API calling softwarecomponent accesses the specified features of the API implementingsoftware component through one or more API calls (sometimes referred toas function or method calls) exposed by the API. The API implementingsoftware component may return a value through the API in response to anAPI call from an API calling software component. While the API definesthe syntax and result of an API call (e.g., how to invoke the API calland what the API call does), the API typically does not reveal how theAPI call accomplishes the function specified by the API call. Variousfunction calls or messages are transferred via the one or moreapplication programming interfaces between the calling software (APIcalling software component) and an API implementing software component.Transferring the function calls or messages may include issuing,initiating, invoking, calling, receiving, returning, or responding tothe function calls or messages. Hence, an API calling software componentcan transfer a call and an API implementing software component cantransfer a call.

By way of example, the API implementing software component 310 and theAPI calling software component may be an operating system, a library, adevice driver, an API, an application program, or other software module(it should be understood that the API implementing software componentand the API calling software component may be the same or different typeof software module from each other). The API calling software componentmay be a local software component (i.e., on the same data processingsystem as the API implementing software component) or a remote softwarecomponent (i.e., on a different data processing system as the APIimplementing software component) that communicates with the APIimplementing software component through the API over a network. Itshould be understood that an API implementing software component mayalso act as an API calling software component (i.e., it may make APIcalls to an API exposed by a different API implementing softwarecomponent) and an API calling software component may also act as an APIimplementing software component by implementing an API that is exposedto a different API calling software component.

The API may allow multiple API calling software components written indifferent programming languages to communicate with the API implementingsoftware component (thus the API may include features for translatingcalls and returns between the API implementing software component andthe API calling software component); however the API may be implementedin terms of a specific programming language.

FIG. 3 illustrates one embodiment of an API architecture which includesan API implementing software component 310 (e.g., an operating system, alibrary, a device driver, an API, an application program, or othersoftware module) that implements the API 320. The API 320 specifies oneor more functions, methods, classes, objects, protocols, datastructures, formats and/or other features of the API implementingsoftware component that may be used by the API calling softwarecomponent 330. The API 320 can specify at least one calling conventionthat specifies how a function in the API implementing software componentreceives parameters from the API calling software component and how thefunction returns a result to the API calling software component. The APIcalling software component 330 (e.g., an operating system, a library, adevice driver, an API, art application program, or other softwaremodule), makes API calls through the API 320 to access and use thefeatures of the API implementing software component 310 that arespecified by the API 320. The API implementing software component 310may return a value through the API 320 to the API calling softwarecomponent 330 in response to an API call.

It will be appreciated that the API implementing software component 310may include additional functions, methods, classes, data structures,and/or other features that are not specified through the API 320 and arenot available to the API calling software component 330. It should beunderstood that the API calling software component 330 may be on thesame system as the API implementing software component 310 or may belocated remotely and accesses the API implementing software component310 using the API 320 over a network. While FIG. 3 illustrates a singleAPI calling software component 330 interacting with the API 320, itshould be understood that other API calling software components, whichmay be written in different languages (or the same language) than theAPI calling software component 330, may use the API 320.

The API implementing software component 310, the API 320, and the APIcalling software component 330 may be stored in a machine-readablemedium, which includes any mechanism for storing information in a formreadable by a machine (e.g., a computer or other data processingsystem). For example, a machine-readable medium includes magnetic disks,optical disks, random access memory; read only memory, flash memorydevices, etc.

In FIG. 4 (“Software Stack”), an exemplary embodiment, applications canmake calls to Services 1 or 2 using several Service APIs and toOperating System (OS) using several OS APIs. Services 1 and 2 can makecalls to OS using several OS APIs.

Note that the Service 2 has two APIs, one of which (Service 2 API 1)receives calls from and returns values to Application 1 and the other(Service 2 API 2) receives calls from and returns values to Application2, Service 1 (which can be, for example, a software library) makes callsto and receives returned values from OS API 1, and Service 2 (which canbe, for example, a software library) makes calls to and receivesreturned values from both OS API 1 and OS API 2. Application 2 makescalls to and receives returned values from OS API 2.

Exemplary Data Processing Devices

FIG. 5 is a block diagram illustrating an exemplary computer systemwhich may be used in some embodiments of the invention. It should beunderstood that while FIG. 5 illustrates various components of acomputer system, it is not intended to represent any particulararchitecture or manner of interconnecting the components as such detailsare not germane to the present invention. It will be appreciated thatother computer systems that have fewer components or more components mayalso be used with the present invention.

As illustrated in FIG. 5, the computer system 500, which is a form of adata processing system, includes the bus(es) 550 which is coupled withthe processing system 520, power supply 525, memory 530, and thenonvolatile memory 540 (e.g., a hard drive, flash memory, Phase-ChangeMemory (PCM), etc.). The bus(es) 550 may be connected to each otherthrough various bridges, controllers, and/or adapters as is well knownin the art. The processing system 520 may retrieve instruction(s) fromthe memory 530 and/or the nonvolatile memory 540, and execute theinstructions to perform operations as described above. The bus 550interconnects the above components together and also interconnects thosecomponents to the optional dock 560, the display controller & displaydevice 570, Input/Output devices 580 (e.g., NIC (Network InterfaceCard), a cursor control (e.g., mouse, touchscreen, touchpad, etc.), akeyboard, etc.), and the optional wireless transceiver(s) 590 (e.g.,Bluetooth, WiFi, Infrared, etc.).

FIG. 6 is a block diagram illustrating an exemplary data processingsystem which may be used in some embodiments of the invention. Forexample, the data processing system 600 may be a handheld computer, apersonal digital assistant (PDA), a mobile telephone, a portable gamingsystem, a portable media player, a tablet or a handheld computing devicewhich may include a mobile telephone, a media player, and/or a gamingsystem. As another example, the data processing system 600 may be anetwork computer or an embedded processing device within another device.

According to one embodiment of the invention, the exemplary architectureof the data processing system 600 may used for the mobile devicesdescribed above. The data processing system 600 includes the processingsystem 620, which may include one or more microprocessors and/or asystem on an integrated circuit. The processing system 620 is coupledwith a memory 610, a power supply 625 (which includes one or morebatteries) an audio input/output 640, a display controller and displaydevice 660, optional input/output 650, input device(s) 670, and wirelesstransceivers) 630. It will be appreciated that additional components,not shown in FIG. 6, may also be a part of the data processing system600 in certain embodiments of the invention, and in certain embodimentsof the invention fewer components than shown in FIG. 6 may be used. Inaddition, it will be appreciated that one or more buses, not shown inFIG. 6, may be used to interconnect the various components as is wellknown in the art.

The memory 610 may store data and/or programs for execution by the dataprocessing system 600. The audio input/output 640 may include amicrophone and/or a speaker to, for example, play music and/or providetelephony functionality through the speaker and microphone. The displaycontroller and display device 660 may include a graphical user interface(GUI). The wireless (e.g., RF) transceivers 630 (e.g., a WiFitransceiver, an infrared transceiver, a Bluetooth transceiver, awireless cellular telephony transceiver, etc.) may be used tocommunicate with other data processing systems. The one or more inputdevices 670 allow a user to provide input to the system. These inputdevices may be a keypad, keyboard, touch panel, multi touch panel, etc.The optional other input/output 650 may be a connector for a dock.

Embodiments of the invention may include various steps as set forthabove. The steps may be embodied in machine-executable instructionswhich cause a general-purpose or special-purpose processor to performcertain steps. Alternatively, these steps may be performed by specifichardware components that contain hardwired logic for performing thesteps, or by any combination of programmed computer components andcustom hardware components.

Elements of the present invention may also be provided as amachine-readable medium for storing the machine-executable program code.The machine-readable medium may include, but is not limited to, floppydiskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs,RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other type ofmedia/machine-readable medium suitable for storing electronic programcode.

Throughout the foregoing description, for the purposes of explanation,numerous specific details were set forth in order to provide a thoroughunderstanding of the invention. It will be apparent, however, to oneskilled in the art that the invention may be practiced without some ofthese specific details. For example, it will be readily apparent tothose of skill in the art that the functional modules and methodsdescribed herein may be implemented as software, hardware or anycombination thereof. Moreover, although embodiments of the invention aredescribed herein within the context of a mobile computing environment(i.e., using mobile devices 120-123; 601-603), the underlying principlesof the invention are not limited to a mobile computing implementation.Virtually any type of client or peer data processing devices may be usedin some embodiments including, for example, desktop or workstationcomputers. Accordingly, the scope and spirit of the invention should bejudged in terms of the claims which follow.

We claim:
 1. A machine-implemented method for securing a wireless dataprocessing device comprising: receiving, by a wireless data processingdevice, at least one input which comprises image data which provides asecurity code; powering down the wireless data processing device into asecurity mode in response to the wireless data processing devicedetermining that the received at least one input which provides thesecurity code has been entered incorrectly a predetermined number oftimes; powering up predetermined portions of the wireless dataprocessing device, in the security mode; obtaining location information,in the security mode, of the wireless data processing device;transmitting, in the security mode, the location information of thewireless data processing device over one or more communication channels;and automatically powering down the predetermined portions of thewireless data processing device in the security mode.
 2. The method ofclaim 1, further comprising: receiving, by the wireless data processingdevice, a second input that comprises a portion of the security code,wherein the second input comprises one of: a numeric entry, analpha-numeric entry, a sequence of button presses, a pattern drawn on atouch screen.
 3. The method of claim 1, further comprising: disablingthe security mode in response to the received at least one inputcomprising the security code having been entered correctly.
 4. Themethod of claim 1, wherein the wireless data processing device comprisesa camera and the image data comprises a picture taken by the camera. 5.The method of claim 1, wherein the image data comprises a picture of atleast one of: an object; a QR code; a 2-dimensional bar code; or a1-dimensional bar code.
 6. The method of claim 1, wherein the image datais received from one of a plurality of input devices on the wirelessdata processing system.
 7. The method of claim 1, further comprising:transmitting, in the security mode, the location information of thewireless data processing device a final time, then; performing a masterreset of the wireless data processing device.
 8. The method of claim 1,wherein location information comprises at least one of: globalpositioning satellite (GPS) coordinates, or one or more cell toweridentifiers, a Radio Frequency Identification (RFID) identifier, or aNear Field Communications (NFC) identifier.
 9. The method of claim 1,wherein the receiving of at least one input is during one of a powerdown sequence or a power up sequence of a wireless data processingdevice.
 10. A non-transitory computer readable medium programmed withinstructions that when executed by a processing system, performoperations that implement a method for securing a wireless dataprocessing device, the operations comprising: receiving, by a wirelessdata processing device, at least one input which comprises image datawhich provides a security code; powering down the wireless dataprocessing device into a security mode in response to the wireless dataprocessing device determining that the received at least one input whichprovides the security code has been entered incorrectly a predeterminednumber of times; powering up predetermined portions of the wireless dataprocessing device, in the security mode; obtaining location information,in the security mode, of the wireless data processing device;transmitting, in the security mode, the location information of thewireless data processing device over one or more communication channels;and automatically powering down the predetermined portions of thewireless data processing device in the security mode.
 11. The medium ofclaim 10, further comprising: receiving, by the wireless data processingdevice, a second input that comprises a portion of the security code,wherein the second input comprises one of: a numeric entry, analpha-numeric entry, a sequence of button presses, a patter drawn on atouch screen.
 12. The medium of claim 10, further comprising: disablingthe security mode in response to the received at least one inputcomprising the security code having been entered correctly.
 13. Themedium of claim 10, wherein the wireless data processing devicecomprises a camera and the image data comprises a picture taken by thecamera.
 14. The medium of claim 10, wherein the image data comprises apicture of at least one of: an object; a QR code; a 2-dimensional barcode; or a 1-dimensional bar code.
 15. The medium of claim 10, whereinthe image data is received from one of a plurality of input devices onthe wireless data processing system.
 16. The medium of claim 10, furthercomprising: transmitting, in the security mode, the location informationof the wireless data processing device a final time, then; performing amaster reset of the wireless data processing device.
 17. The medium ofclaim 10, wherein location information comprises at least one of: globalpositioning satellite (GPS) coordinates, or one or more cell toweridentifiers, a Radio Frequency Identification (RFID) identifier, or aNear Field Communications (NFC) identifier.
 18. The medium of claim 10,wherein the receiving of at least one input is during one of a powerdown sequence or a power up sequence of a wireless data processingdevice.
 19. A system comprising: a processing system programmed withexecutable instructions that, when executed, perform amachine-implemented method for securing a wireless data processingdevice comprising: receiving, by a wireless data processing device, atleast one input which comprises image data which provides a securitycode; powering down the wireless data processing device into a securitymode in response to the wireless data processing device determining thatthe received at least one input which provides the security code hasbeen entered incorrectly a predetermined number of times; powering uppredetermined portions of the wireless data processing device, in thesecurity mode; obtaining location information, in the security mode, ofthe wireless data processing device; transmitting, in the security mode,the location information of the wireless data processing device over oneor more communication channels; and automatically powering down thepredetermined portions of the wireless data processing device in thesecurity mode.
 20. The system of claim 19, further comprising:receiving, by the wireless data processing device, a second input thatcomprises a portion of the security code, wherein the second inputcomprises one of: a numeric entry, an alpha-numeric entry, a sequence ofbutton presses, a patter drawn on a touch screen.
 21. The system ofclaim 19, further comprising: disabling the security mode in response tothe received at least one input comprising the security code having beenentered correctly.
 22. The system of claim 19, wherein the wireless dataprocessing device comprises a camera and the image data comprises apicture taken by the camera.
 23. The system of claim 19, wherein theimage data comprises a picture of at least one of: an object; a QR code;a 2-dimensional bar code; or a 1-dimensional bar code.
 24. The system ofclaim 19, wherein the image data is received from one of a plurality ofinput devices on the wireless data processing system.
 25. The system ofclaim 19, further comprising: transmitting, in the security mode, thelocation information of the wireless data processing device a finaltime, then; performing a master reset of the wireless data processingdevice.
 26. The system of claim 19, wherein location informationcomprises at least one of: global positioning satellite (GPS)coordinates, or one or more cell tower identifiers, a Radio FrequencyIdentification (RFID) identifier, or a Near Field Communications (NFC)identifier.
 27. The system of claim 19, wherein the receiving of atleast one input is during one of a power down sequence or a power upsequence of a wireless data processing device.