System, device, and method for distress response

ABSTRACT

In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a housing arranged to hold a second device and sensor(s), where the sensor(s) are operable to obtain a tactile input. The apparatus also includes a communication interface operable to communicate with the second device. Additionally, the apparatus includes a controller operable to direct the second device, through the communication interface, to generate a distress response in response to receiving the tactile input. In some embodiments, the apparatus also includes remote communication device(s) to communicate with a remote source. In such embodiments, the controller is coupled to the remote communication device(s), where the controller receives the geo-fencing information through the one or more communication devices, compares the information with movement and location information of the apparatus, and determines whether to direct the second device to enter a distress mode based on the comparison.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.16/272,899 filed on Feb. 11, 2019, which further claims priority to U.S.provisional patent application No. 62/630,125 filed on Feb. 13, 2018,the contents of which are hereby incorporated by reference for allpurposes.

TECHNICAL FIELD

This relates generally to the field of privacy protection, and morespecifically to an apparatus that activates or deactivates a device inorder to generate a distress response.

BACKGROUND

Smartphones have sensors for collecting information of a user, includingthe surroundings of the user, e.g., microphones for recording voice,cameras for recording images, and an inertial measurement unit (IMU) formeasuring location and position of the user. Smartphones also haveradios for local or remote communications, such as a cellular radio forcommunicating with a base station, a Global Positioning System (GPS)radio for communicating with a satellite, a near field communication(NFC) radio, a WiFi radio, and/or a Bluetooth radio for pairing withanother device nearby. These sensors and radios are capable of providinga wealth of user information to third parties. Using such information,one may piece together real-time and/or historical records of the user.

Currently, most smartphones do not alert users when user private dataare collected and/or disseminated. Consequently, when third-parties(e.g., hackers) gain unwanted access to a smartphone (e.g., hijack), auser may not be aware of the privacy invasion. Moreover, when the smartdevices are in danger of being hijacked, conventional systems anddevices do not provide methods of efficient distress mode activation,and thus cannot effectively protect the smart devices.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the present disclosure can be understood by those of ordinaryskill in the art, a more detailed description can be had by reference toaspects of some illustrative embodiments, some of which are shown in theaccompanying drawings.

FIG. 1 is a block diagram of an exemplary apparatus holding a personalcommunication device in accordance with some embodiments;

FIG. 2 illustrates activating a distress response system in accordancewith some embodiments;

FIG. 3 illustrates establishing geo-fencing in a distress responsesystem in accordance with some embodiments;

FIG. 4 illustrates a context-based distress response system usinggeo-fencing in accordance with some embodiments; and

FIG. 5 is a flowchart illustrating a distress response generation methodin accordance with some embodiments.

In accordance with common practice the various features illustrated inthe drawings cannot be drawn to scale. Accordingly, the dimensions ofthe various features can be arbitrarily expanded or reduced for clarity.In addition, some of the drawings cannot depict all of the components ofa given system, method or device. Finally, like reference numerals canbe used to denote like features throughout the specification andfigures.

DETAILED DESCRIPTION

Accordingly, described herein is an apparatus (also known as a smartcase, a safe case, a secure case, an active case, or an active base)that protects a device (e.g., a smart device) used by a user frompotential privacy invasion. In some embodiments, when the user becomesaware of potential threat, the user enters a tactile input into theapparatus and/or the device. The apparatus, upon receiving the tactileinput, determines if the manner in which the input was entered indicatesthat the user intends for the device to be protected. For example,policies can be defined that specify predefined input patterns, suchthat a match of the user input to a predefined input pattern indicatesthe user's intent to place the device in a distress mode. In someembodiments, the predefined input patterns include a gesture or movementsequence pattern. In some embodiments, once in the distress mode, theapparatus and/or the device generates a distress response, such assending out a distress signal, shutting down the device, communicatingwith emergency services, and/or shielding the device from intrusion. Insome embodiments, without user intervention, the apparatus activelymonitors the movement and location of the device and places the devicein the distress mode when the device approaches or crosses a high threatarea. In such embodiments, the apparatus further directs the device toend the distress mode in response to a determination that the deviceexits the high threat area.

In accordance with some embodiments, an apparatus includes a housingarranged to hold a second device; one or more sensors, at leastpartially supported by the housing, operable to obtain a tactile input;a communication interface, at least partially supported by the housingand connectable to the second device, operable to communicate with thesecond device; and a controller, coupled to the communication interfaceand the one or more sensors, operable to direct the second device,through the communication interface, to generate a distress response inresponse to receiving the tactile input.

In accordance with some embodiments, a device includes one or moreprocessors, non-transitory memory, and one or more programs; the one ormore programs are stored in the non-transitory memory and configured tobe executed by the one or more processors and the one or more programsinclude instructions for performing or causing performance of theoperations of any of the methods described herein. In accordance withsome embodiments, a non-transitory computer readable storage medium hasstored therein instructions which when executed by one or moreprocessors of a device, cause the device to perform or cause performanceof the operations of any of the methods described herein. In accordancewith some embodiments, a device includes means for performing or causingperformance of the operations of any of the methods described herein.

Reference will now be made in detail to embodiments, examples of whichare illustrated in the accompanying drawings. In the following detaileddescription, numerous specific details are set forth in order to providea thorough understanding of the various described embodiments. However,it will be apparent to one of ordinary skill in the art that the variousdescribed embodiments may be practiced without these specific details.In other instances, well-known methods, procedures, components,circuits, and networks have not been described in detail so as not tounnecessarily obscure aspects of the embodiments.

It will also be understood that, although the terms first, second, etc.are, in some instances, used herein to describe various elements, theseelements should not be limited by these terms. These terms are only usedto distinguish one element from another. For example, a first contactcould be termed a second contact, and, similarly, a second contact couldbe termed a first contact, without departing from the scope of thevarious described embodiments. The first contact and the second contactare both contacts, but they are not the same contact, unless the contextclearly indicates otherwise.

The terminology used in the description of the various describedembodiments herein is for the purpose of describing particularembodiments only and is not intended to be limiting. As used in thedescription of the various described embodiments and the appendedclaims, the singular forms “a”, “an”, and “the” are intended to includethe plural forms as well, unless the context clearly indicatesotherwise. It will also be understood that the term “and/or” as usedherein refers to and encompasses any and all possible combinations ofone or more of the associated listed items. It will be furtherunderstood that the terms “includes”, “including”, “comprises”, and/or“comprising”, when used in this specification, specify the presence ofstated features, integers, steps, operations, elements, and/orcomponents, but do not preclude the presence or addition of one or moreother features, integers, steps, operations, elements, components,and/or groups thereof.

As used herein, the term “if” is, optionally, construed to mean “when”,“upon”, “in response to determining”, or “in response to detecting”,depending on the context. Similarly, the phrase “if it is determined” or“if [a stated condition or event] is detected” is, optionally, construedto mean “upon determining”, “in response to determining”, “upondetecting [the stated condition or event],” or “in response to detecting[the stated condition or event],” depending on the context.

It should be appreciated that in the development of any actualembodiment (as in any development project), numerous decisions must bemade to achieve the developers' specific goals (e.g., compliance withsystem and business-related constraints), and that these goals will varyfrom one embodiment to another. It will also be appreciated that suchdevelopment efforts might be complex and time consuming, but wouldnevertheless be a routine undertaking for those of ordinary skill in theart of image capture having the benefit of this disclosure.

Referring to FIG. 1, a simplified block diagram of an apparatus 120(also known as a smart case, a safe case, a secure case, an active case,or an active base) holding a personal communication device 110 (alsoknown as a user equipment) is depicted, in accordance with someembodiments. Different from a conventional base or case that merelyholds a personal communication device, the active case 120 activelymonitors the personal communication device 110, collects informationfrom the personal communication device 110, and uses the information forthreat analysis. The information gathered by the active case 120provides an enterprise network visibility of activities even when thepersonal communication device 110 is operating in public places. Assuch, through the active case 120, the enterprise is capable ofcontrolling network activities involving the personal communicationdevice 110. In particular, the active monitoring of the personalcommunication device 110 by the active case 120 enables threatdetection. Upon detecting potential threat, the active case 120 activelydirects the personal communication device 110 to enter a distress modefor the privacy protection of the user. It should be noted that whilethe aforementioned features and components are illustrated, those ofordinary skill in the art will appreciate from the present disclosurethat various other features and components have not been illustrated forthe sake of brevity and so as not to obscure more pertinent aspects ofthe embodiments disclosed herein. Also, those of ordinary skill in theart will appreciate from the present disclosure that the functions ofthe components described below can be combined into one or morecomponents and/or further sub-divided into additional sub-components;and, that the components described below are provided as exemplaryconfiguration of the various aspects and functions described herein.

In some embodiments, the active case 120 includes a housing 125 arrangedto hold the personal communication device 110 (e.g., a smartphone, awearable, a tablet, etc.). In some embodiments, the housing 125 includesa plurality of components mateable with one another. In other words, theplurality of components, once mated with one another, form a housingassembly to hold the personal communication device 110. The housingassembly allows a user to insert the personal communication device 110into the active case 120, so that the active case 120 can activelymonitor activities of the personal communication device 110. The housingassembly also allows the user to take the personal communication device110 out of the active case 120 for less monitoring of the personalcommunication, e.g., when the user uses the personal communicationdevice 110 for personal communication and the user prefers lessmonitoring by an enterprise through the active case 120.

In some embodiments, the active case 120 has one or more moveablecomponents (e.g., a hood) operable to slide to one or more positions(e.g., up or down) as well as non-moveable components. In suchembodiments, the one or more moveable components, when in a firstposition (e.g., hood pushed down), are mateable (e.g., mechanicallyand/or electrically) with the non-moving components to form a housingassembly. The housing assembly forms an enclosure that at leastpartially supports and holds the personal communication device 110,e.g., a partial enclosure as shown in FIG. 1 or a whole enclosureencapsulating the personal communication device 110 (not shown). When inthe first position, the housing 125, along with other components of theactive case 120, protects the personal communication device 110 againsttracking or spying, e.g., by audio jamming, camera covering, and/orradio frequency (RF) shielding, etc. When the one or more moveablecomponents of the housing assembly are in a second position (e.g., hoodslid up), a user can take the personal communication device 110 out ofthe housing 125 and place the personal communication device 110 in anon-protected mode.

In some embodiments, the active case 120 includes one or more localcommunication devices 140 supported by the housing 125. In someembodiments, the one or more local communication devices 140 include apersonal communication device interface modem (e.g., a WiFi modem, aBluetooth (BT)/Bluetooth Low Energy (BLE) radio, an infrared radio, anNFC radio, a Lightning® (a registered trademark of Apple Inc.,Cupertino, Calif.) connector, etc.) operable to provide a communicationchannel (e.g., wirelessly or via physical connection) between theperipheral interface and the personal communication device 110. In onedirection, the communication channel carries information from thepersonal communication device 110 to the active case 120 for analysisand validation. In the other direction, the communication channelcarries information from the active case 120 to the personalcommunication device 110 in order to gate electronic signal to thepersonal communication device 110 for the protection of the personalcommunication device 110 and/or supplement the functionality of thepersonal communication device 110.

In some embodiments, the active case 120 includes one or more remotecommunication devices 145 supported by the housing 125 to transmitinformation associated with the user equipment 110 to a remote source.For example, in a multi-user environment, using the one or more remotecommunication devices 145, each active case 120 can report its locationand timestamp along with RF signal information to the remote source, sothat the remote source can derive a threat location map identifyingpotentially malicious RF transmitters. The threat location map is thenprovided to the active case 120 through the one or more remotecommunication devices 145.

In some embodiments, the remote source is a trusted source, such thatthe communication channel between the one or more remote communicationdevices 145 and the remote source is authenticated and secure. In someembodiments, when the active case 120 directs the user equipment 110 togenerate a distress response, the distress response is transmittedthrough the one or more remote communication devices 145 using thesecure communication channel. The one or more remote communicationdevices 145, in some embodiments, include one or more wirelesscommunication devices, such as a GPS module, a cellular communicationmodule, or a WiFi radio. The one or more remote communication devices145 use any of a plurality of communications standards, protocols, andtechnologies, including but not limited to Global System for MobileCommunications (GSM), Enhanced Data GSM Environment (EDGE), high-speeddownlink packet access (HSDPA), high-speed uplink packet access (HSUPA),Evolution, Data-Only (EV-DO), HSPA, HSPA+, Dual-Cell HSPA (DC-HSPDA),long term evolution (LTE), wideband code division multiple access(W-CDMA), code division multiple access (CDMA), time division multipleaccess (TDMA), and/or Wi-Fi (e.g., IEEE 802.11a, IEEE 802.11b, IEEE802.11g, IEEE 802.11n, and/or IEEE 802.11ac), or any other suitablecommunication protocol, including communication protocols not yetdeveloped as of the filing date of this document.

In some embodiments, the active case 120 includes a plurality of sensors150.

For example, the plurality of sensors 150 include one or moreaccelerometers, radio frequency (RF) emission sensors, gyroscopes (e.g.,for detecting rotational movement), and/or magnetometers (e.g., as partof an inertial measurement unit (IMU)) for obtaining informationconcerning the position (e.g., altitude) of the active case 120, lightor optical sensors (e.g., for detecting the user covering or shieldingthe light), or acoustic sensors (e.g., for receiving voice command) Insome embodiments, the plurality of sensors 150 are coupled withinput/output (I/O) peripheral devices, e.g., a touch I/O device that canreceive touch input for interacting with the active case 120. In someembodiments, the touch I/O device is an integral part of the userequipment 110 or is separate from the user equipment 110. In someembodiments, the touch I/O device includes a touch sensitive surface,which is wholly or partially transparent, semitransparent,non-transparent, opaque or any combination thereof. In some embodiments,the touch I/O device is configured to detect the location of one or moretouches or near touches on the active case 120 based on capacitive,resistive, optical, acoustic, inductive, mechanical, chemicalmeasurements, or any phenomena that can be measured with respect to theoccurrences of the one or more touches or near touches in proximity tothe active case 120. Software, hardware, firmware or any combinationthereof can be used to process the measurements of the detected touchesto identify and track one or more gestures.

As used herein, a gesture corresponds to stationary, substantiallystationary, or non-stationary, single or multiple, touches or neartouches on the touch I/O device. In some embodiments, a gesture isperformed by moving one or more fingers or other objects in a particularmanner on touch I/O device, such as tapping, pressing, rocking,scrubbing, twisting, changing orientation, pressing with varyingpressure and the like at essentially the same time, contiguously, orconsecutively. In some embodiments, a gesture is characterized by, butis not limited to a pinching, sliding, swiping, rotating, flexing,dragging, or tapping motion between or with any other finger or fingers.In some embodiments, a single gesture is performed with one or morehands, by one or more users, or any combination thereof. In someembodiments, through the plurality of sensors 150 and/or the touch I/Odevice, the active case 120 is operable to acquire timing and/or forceinformation associated with the inputs entered through the plurality ofsensors 150 and/or touch I/O device.

In some embodiments, the active case 120 includes memory 130. In someembodiments, the memory 130 includes one or more memory devices,including fixed and/or removable memory devices. In some embodiments,the memory 130 provides a non-transitory computer-readable storagemedium for storing computer program instructions (e.g., theapplication(s)) to be executed by the controller 122. In addition, insome embodiments, the memory 130 provides secure storage of informationassociated with the protected device 110. In some embodiments, thememory 130 exchanges information with one or more of the controller 122,the local communication devices 140, the remote communication devices145, or the sensors 150 via a bus. In some embodiments, the applicationsstored in the memory 130 include an application for exchanginginformation between the personal communication device 110 and anexternal electronic device (e.g., the active case 120). The informationexchange includes, for example, transmitting information obtained by thecommunication devices 114 and/or sensors 118 to an external electronicdevice (e.g., the active case 120) or receiving information from theexternal electronic device, e.g., the information gathered by asupplemental functional device (not shown) and relayed by the activecase 120 via a peripheral interface (not shown) and the localcommunication devices 140.

Though not shown in FIG. 1, in some embodiments, the active case 120includes a peripheral interface (e.g., a backpack interface) that iscoupled to the local communication device 140 and connected to asupplemental functional device (e.g., a backpack). A supplementalfunctional device, as described herein, is a device connectable to theuser equipment 110 through the active case 120 and provides supplementalfunctional functions to the user equipment 110. For example, thesupplemental functional device can include an RF detector and/or an RFpower detector for detecting energy emitted from and/or received by theuser equipment 110. The peripheral interface connects the supplementalfunctional device to the active case 120 and the local communicationdevice 140 further connects the peripheral interface to the userequipment 110. In some embodiments, the active case 120 is also capableof performing the supplemental functions provided by the supplementalfunctional device, e.g., analyzing the RF energy emitted from orreceived by the user equipment 110.

In some embodiments, the peripheral interface includes physicalconnectors providing wired connection. In some embodiments, theperipheral interface is a wireless interface. In some embodiments, theperipheral interface includes a wireless modem operable to wirelesslycommunicate with the supplemental functional device. In someembodiments, the peripheral interface leverages the wirelesscommunication capability of the local communication device 140 tocommunicate with the supplemental functional device. For example, theactive case 120 can connect to a wireless communication enabled backpackdevice through a wireless peripheral interface or through a wirelessmodem of the local communication device 140. As such, a wirelesscommunication enabled backpack can communicate with the active case 120without being in contact with the housing 125 or physically connected tothe peripheral interface.

In some embodiments, the active case 120 includes a controller 122coupled to the peripheral interface, the local communication device 140,and the remote communication device 145. Embodiments of the controller122 include hardware, software, firmware, or a combination thereof. Insome embodiments, the controller 122 is operable to manage thecommunication channel between the personal communication device 110 andthe backpack and through the local communication device 140 and theperipheral interface. In other words, the controller 122 manages asegment of the communication channel between the personal communicationdevice 110 and the active case 120 through the management of the localcommunication device 140, and the controller 122 manages a segment ofthe communication channel between the active case 120 and the backpackthrough the management of the peripheral interface.

In some embodiments, the controller 122 analyzes an input received bythe user equipment 110 and/or the active case 120. The controller 122further determines if the input matches a predetermined sequence. Inaccordance with a determination that the input matches the predeterminedsequence, the controller 122 gates an electronic signal to the userequipment 110 in order to protect the user equipment 110, e.g., placingthe user equipment 110 in a distress mode.

In some embodiments, the active case 120 includes a power supply 124.The power supply 124 supplies power to the peripheral interface, thelocal communication device 140, and the controller 122. In someembodiments, the power supply 124 includes at least one of a battery, acharging socket, a USB connector, a power plug, and/or a power socket.In some embodiments, the power supply 124 includes a connector for abattery.

In some embodiments, the personal communication device 110 held by theactive case 120 includes a processor 112, one or more communicationdevices 114, an input/output (I/O) interface 116, sensors 118, memory111, and applications 113, which further includes instructions stored inthe memory 111 and executed by the processor 112. In some embodiments,the personal communication device 110 is a portable communicationsdevice, such as a mobile phone, a wearable device, a tablet, a laptopcomputer, a digital media player, an electronic reader, or the like. Insome embodiments, the personal communication device is a non-portabledevice, such as a desktop computer, a data storage device, a smart TV, avideo game console, a smart home appliance or the like that is capableof storing, transmitting, and receiving data. It will be appreciatedthat the components, devices or elements illustrated in and describedwith respect to FIG. 1 below may not be mandatory and thus some may beomitted in certain embodiments. Additionally, some embodiments caninclude further or different components, devices or elements beyondthose illustrated in and described with respect to FIG. 1.

In some embodiments, the processor 112 is coupled to the communicationdevices 114 in order to manage the communication through thecommunication device 114. In addition to managing the communication, theprocessor 112 processes data and executes applications 113, inaccordance with some embodiments. In some embodiments, the applications113 include a touch processing module that analyzes an input received bythe user equipment 110 and determines if the input matches apredetermined input pattern. In accordance with a determination that theinput matches a predetermined input pattern, the user equipment 110executes a predefined command, e.g., to place the user equipment 110 ina distress mode.

In some embodiments, the processor 112 includes one or more chipschipsets embodied in a variety of forms. For example, the processor 112can be embodied as various hardware-based processing means such as amicroprocessor, a coprocessor, a controller, or other computing devicesincluding integrated circuits, such as an ASIC (application specificintegrated circuit), an FPGA (field programmable gate array), somecombination thereof, or the like. Although illustrated as a singleprocessor, it will be appreciated that the processor 112 can comprise aplurality of processors. The plurality of processors communicates witheach other and collectively performs one or more functionalities. Insome embodiments, the processor 112 can be configured to executeinstructions that can be stored in the memory 111 or that can beotherwise accessible to the processor 112. As such, whether configuredby hardware or by a combination of hardware, firmware, and software, theprocessor 112 is capable of performing operations according to variousembodiments.

In some embodiments, the memory 111 includes one or more memory devices,including fixed and/or removable memory devices. In some embodiments,the memory 111 provides a non-transitory computer-readable storagemedium for storing computer program instructions (e.g., theapplication(s) 113) to be executed by the processor 112. In someembodiments, the memory 111 exchanges information with one or more ofthe processor 112, the I/O interface 116, the one or more communicationdevices 114, or sensors 118 via a bus. In some embodiments, theapplications 113 stored in the memory 111 include an application forexchanging information between the user equipment 110 and an externalelectronic device (e.g., the active case 120). The information exchangeincludes, for example, transmitting information obtained by thecommunication device 114 and/or sensors 118 to an external electronicdevice (e.g., the active case 120) or receiving information from theexternal electronic device, e.g., the information gathered by thesupplemental functional devices and relayed by the active case 120 viathe peripheral interface and the local communication devices 140.

In some embodiments, the I/O interface 116 provides a channel forinput/output data between the processor 112 and I/O peripheral devices,such as a display, a keyboard, a mouse, a pen, microphones, cameras,and/or speakers of the user equipment 110. In some embodiments, theperipheral devices are connected to the I/O interface 116 wirelessly,e.g., via the communication devices 114. In some embodiments, I/Operipheral devices include a touch I/O device that can receive touchinput for interacting with the user equipment 110. The touch I/O devicereceives a user input and provides the user input to the user equipment110 in lieu of or in combination with other I/O peripheral devices, suchas a keyboard, a mouse, etc. In some embodiments, the touch I/O deviceis an integral part of the user equipment 110 or is separate from theuser equipment 110. In some embodiments, the touch I/O device includes atouch sensitive surface, which is wholly or partially transparent,semitransparent, non-transparent, opaque or any combination thereof. Inother words, embodiments of the touch I/O device include a touch screen,a touch pad, a touch screen functioning as a touch pad (e.g., a touchscreen replacing the touchpad), a touch screen or touchpad combined orincorporated with any other input device (e.g., a touch screen ortouchpad disposed on a keyboard) or any multi-dimensional object havinga touch sensitive surface for receiving touch input.

In some embodiments, the touch I/O device is configured to detect thelocation of one or more touches or near touches on the user equipment110 based on capacitive, resistive, optical, acoustic, inductive,mechanical, chemical measurements, or any phenomena that can be measuredwith respect to the occurrences of the one or more touches or neartouches in proximity to the user equipment 110. Software, hardware,firmware or any combination thereof can be used to process themeasurements of the detected touches to identify and track one or moregestures. In some embodiments, the user equipment 110 is operable toacquire location, timing, and/or force information associated withinputs that are entered through the touch I/O device, e.g., through thecoupling with the sensors 118 (e.g., contact intensity sensors).

In some embodiments, the one or more communication devices 114 connectthe user equipment 110 and an external electronic device wirelessly orthrough a wired connection. In some embodiments, the external electronicdevice is the active case 120, such that the one or more communicationdevices 114 connect to the active case 120 through physical connectionor wirelessly. The wireless communication protocols include at least oneof, for example, Wi-Fi (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g,IEEE 802.11n, and/or IEEE 802.11ac), BT/BLE, Near Field Communication(NFC), Global Positioning System (GPS), and/or cellular communication,including but not limited to long term evolution (LTE), wideband codedivision multiple access (W-CDMA), code division multiple access (CDMA),time division multiple access (TDMA), or Global System for MobileCommunications (GSM). The wired connections include at least one of, forexample, a Universal Serial Bus (USB) connector, a High DefinitionMultimedia Interface (HDMI) connector, and/or a Lightning® (a registeredtrademark of Apple Inc. of Cupertino, Calif.) connector. In someembodiments, the input (e.g., a tactile input) received through thesensor 118 and/or the I/O interface 116 is communicated to the activecase 120 via a communication channel comprising the one or morecommunication devices 114 of the user equipment 110 and the one or morelocal communication devices 140 of the active case 120.

In some embodiments, when in a particular communication mode (e.g., anairplane mode), the one or more communication devices 114 on the userequipment 110 are turned off. In such communication mode, thecommunication channel between the active case 120 and the user equipment110 is disconnected. Once disconnected, in some embodiments, the activecase 120 is capable of directing a signal to the user equipment 110, sothat the user equipment 110 enables its one or more communicationdevices 114 under the direction of the active case 120. For example, inresponse to receiving a tactile input matching a predefined inputpattern, the active case 120 wakes up the user equipment 110 toestablish the communication channel comprising the communicationdevice(s) 114 and the one or more local communication devices 140. Insome embodiments, through the established communication channel, theactive case 120 directs the user equipment 110 to activate a distressmode, e.g., transmitting a distress signal, communicating with emergencyservices, reporting potential threat etc.

In some embodiments, the user equipment 110 includes sensors 118, suchas one or more accelerometers, gyroscopes, and/or magnetometers (e.g.,as part of an inertial measurement unit (IMU)) for obtaining informationconcerning the position (e.g., altitude) of the user equipment 110,light sensors, or acoustic sensors. In some embodiments, the sensors 118are coupled to the I/O interface 116, such that the informationcollected by the sensors 118 are passed to the processor 112 by the I/Ointerface 116 for further processing. In some embodiments, the sensors118 are coupled to the communication device 114, such that theinformation collected by the sensors 118 is transmitted to anotherdevice (e.g., the active case 120) for validation and threat detection.In some embodiments, the sensor 118 is coupled to the power supply(e.g., a battery) of the user equipment 110 for obtaining the powerlevel of the user equipment 110.

Turning to FIG. 2, FIG. 2 illustrates activating a distress responsesystem, which includes the active case 120 holding the user equipment110, in accordance with some embodiments. In some embodiments, thedistress response activation is triggered by a tactile input. Forexample, an application (e.g., the application(s) 113 in FIG. 1)executing on the user equipment 110 obtains data associated with atactile input 210, where the tactile input 210 is detected by thesensors 118 (FIG. 1) of the user equipment 110. In another example,instead of detecting a tactile input using the sensors 118 (FIG. 1) ofthe user equipment 110, the tactile input is detected by the pluralityof sensors 150 (FIG. 1) of the active case 120, e.g., the active case120 detects a tactile input 220. In such embodiments, the controller 122(FIG. 1) of the active case 120 obtains data associated with the tactileinput 220 through the coupling with the plurality of sensors 150 (FIG.1).

In some embodiments, the input 210 and/or the input 220 can be a touchinput on a touch sensitive surface of the user equipment 110 and/or theactive case 120, a press input on a button or a switch of the userequipment 110 and/or the active case 120, or a movement (e.g., shakingor dropping) of the user equipment 110 held by the active case 120 in acertain pattern detected by sensors (e.g., the vibration and/or IMUsensors of the user equipment 110 and/or the vibration and/or IMUsensors of the active case 120). The application 113 (FIG. 1) and/or thecontroller 122 (FIG. 1) further analyze the input 210 and/or the input220 in order to determine if the manner in which the input 210 and/orthe input 220 entered match a predefined input pattern. A matchindicates that the user intends for the user equipment 110 to activatethe distress mode.

In some embodiments, the analysis of the input 210 and/or the input 220includes analyzing a location, timing, force, speed, and/or accelerationof the input 210 and/or the input 220. For example, analyzing the timingdata associated with the input 210 and/or the input 220 can includeanalyzing the time intervals between different portions of the input 210and/or the input 220. In another example, the analysis of a double-tapinput includes detecting a first touch (touch begin) on the userequipment 110 and/or the active case 120 for a predetermined duration, afirst lift-off (touch end) for a predetermined duration, a second touch(touch begin) for a predetermined duration, and a second lift-off (touchend) for a predetermined duration. In yet another example, the analysisof a dragging input comprises detecting a touch (or contact) on the userequipment 110 and/or the active case 120 for a predetermined duration, amovement of the touch across the touch-sensitive surface of the userequipment and/or the active case 120, and a lift-off of the touch. Theapplication 113 (FIG. 1) and/or the controller 122 (FIG. 1) analyze theinput 210 and/or the input 220 in order to determine if the location,timing, force, speed, and/or acceleration of the input 210 and/or theinput 220 match a predefined input matter.

Turning to FIG. 3, FIG. 3 illustrates establishing geo-fencing in adistress response system, in accordance with some embodiments.Geo-fences allow a user to specify a location-based policy for taking anaction when the user with a user equipment protected by the active case120 is at or near a location and/or an area. In order to establishgeo-fencing, in some embodiments, a plurality of active cases 120 in amulti-user environment, each holding a respective user equipment (notshown in FIG. 3), transmits information identifying their locations to asecure base station 320, e.g., via the remote communication device(s)145 (FIG. 1). In some embodiments, the plurality of active cases 120utilizes the remote communication capabilities of the communicationdevice(s) 114 (FIG. 1) of the user equipment 110 (FIG. 1).

In some embodiments, each active case 120 (or the backpack attached tothe active case 120) can send a receive signal strength indicator (RSSI)of the RF signal exchanged between an RF emitter 310 and a respectiveuser equipment held by the active case 120, a timestamp, and ageolocation (e.g., obtained from GPS) to a cloud associated with asecure base station 320. For example, in FIG. 3, as indicated by thetriangle-shaped arrowhead, the active case 1 120-1 reports its RSSI,timestamp, and location information while the active case 1 120-1 movesin an eastward direction; the active case 2 120-2 reports its RSSI,timestamp, and location information while the active case 2 120-2 movesin a northwest direction; and the active case 3 120-3 reports its RSSI,timestamp, and location information while the active case 3 120-3 movesin a southwest direction. Based on the information received from theactive cases 120, the cloud associated with the secure base station 320calculates location information of the RF emitter 310 exchanging signalswith the user equipment.

In some embodiments, the secure base station 320 identifies a moving RFemitter as a potential threat, and establishes a high threat area as ageo-fence around the moving RF emitter. For example, in FIG. 3, a highthreat area 330 is identified as a dotted circle centered around the RFemitter 310, and a geo-fence is established around the high threat area330. The perimeter of the high threat area 330 is a boundary fordetermining when the geo-fence is triggered, e.g., when the userequipment is crossing the boundary or approaching the boundary of thehigh threat area 330. In some embodiments, based on the locationinformation received from the plurality of active cases 120, the cloudassociated with the secure base station 320 calculates the location ofthe RF emitter 310 and provides the location of the RF emitter 310 tothe plurality of active cases 120. The plurality of active cases 120then uses the location of the RF emitter 310 to establish one or moregeo-fences. Accordingly, when a user equipment held by a respectiveactive case 120 approaches, near, or at the location of the RF emitter310, the respective active case 120 determines that a geo-fence istriggered. In response to the triggering of the geo-fence, therespective active case 120 directs the user equipment to activate thedistress mode. Though FIG. 3 shows one high threat area 330, as will beshown below, a threat location map can include more than one high threatarea. In some embodiments, the threat location map is communicated tothe active cases 120 through the remote communication device(s) 145(FIG. 1) of each active case 120 for the protection of the respectiveuser equipment held by the active case 120.

FIG. 4 illustrates a context-based distress response system 400 usinggeo-fencing, in accordance with some embodiments. As explained above inconnection with FIG. 3, geo-fences allow a user to specify alocation-based policy for taking an action the next time the user of theuser equipment 110 held by the active case 120 is at or near ageographic location (e.g., an RF emitter 430) or area (e.g., a highthreat area 420). In some embodiments, a network administrator of thecontext-based distress response system 400 specifies the location-basedpolicy. Once specified, when the user equipment 110 held by the activecase 120 is within a threshold distance from the high threat areas 420and/or the RF emitters 430, the active case 120 determines that thegeo-fence is triggered. In some embodiments, in response to thegeo-fence triggering, the active case 120 directs the user equipment 110to activate and enter the distress mode.

In the context-based distress response system 400, a user 105 carryingthe user equipment 110 held by the active case 120 travels along a path410. In some embodiments, a secure base station 440 identifies two highthreat areas 420-1 and 420-2 along or near the path 410 in accordancewith the method described with reference to FIG. 3 above. For instance,the secure base station 440 identifies a threat location map thatincludes the high threat area 420-1 associated with an RF emitter 430-1and the high threat area 420-2 associated with an RF emitter 430-2.According to the threat location map, geo-fences are established suchthat when the path 410 crosses a perimeter of a respective high threatarea 420 or is within a threshold distance of a respective location 430,a command is triggered to activate the distress mode. For instance, whenthe path 410 is not crossing or not expected to be within a thresholddistance from the high threat area 420-1, the active case 120 does notdirect the user equipment 110 to enter the distress mode. On the otherhand, when the path 410 is within a threshold distance of, entering, orprojected to enter the high threat area 420-2, geo-fencing is triggered.Once triggered, the active case 120 directs the user equipment 110 toactivate and enter the distress mode, in accordance with someembodiments. In some embodiments, once in the distress mode, the activecase 120 and/or the user equipment 110 generate a distress response,such as sending out a distress signal, shutting down the user equipment110, communicating with emergency services, and/or shielding the userequipment 110 from intrusion.

FIG. 5 is a flowchart representation of a distress response generationmethod 500, in accordance with some embodiments. In some embodiments,the method 500 is performed at an apparatus (e.g., the active case 120,FIG. 1) with a communication interface (e.g., the local communicationdevice 140, FIG. 1), a controller (e.g., the controller 122, FIG. 1) anda non-transitory memory (e.g., the memory 130, FIG. 1) storinginstructions for execution by the controller. Briefly, the method 500includes obtaining a tactile input and/or a geographic location of theapparatus (e.g., the active case 120, FIG. 1), where the apparatus holdsa second device (e.g., the user equipment 110, FIG. 1) for the privacyprotection of the second device. In response to a determination that thetactile input matches a predetermined input pattern and/or thegeographic location of the apparatus is triggering a geo-fence, themethod 500 includes directing the second device to enter a distressmode. It should be noted that while the aforementioned features andcomponents are illustrated, those of ordinary skill in the art willappreciate from the present disclosure that various other features andcomponents have not been illustrated for the sake of brevity and so asnot to obscure more pertinent aspects of the embodiments disclosedherein. Also, those of ordinary skill in the art will appreciate fromthe present disclosure that the functions of the components describedbelow can be combined into one or more components and/or furthersub-divided into additional sub-components; and, that the componentsdescribed below are provided as exemplary configuration of the variousaspects and functions described herein.

To that end, as represented by block 510, the method 500 includesobtaining a tactile input on the apparatus and/or the second device(e.g., the tactile input 210 on the user equipment 110 and/or thetactile input 220 on the active case 120 as shown in FIG. 4). Forexample, the tactile input can be a gesture corresponds to stationary,substantially stationary, or non-stationary, single or multiple, touchesor near touches on the touch-sensitive surface of the apparatus and/orthe second device. In another example, the tactile input can be detectedby an optical sensor (e.g., by covering or shielding the light), anacoustic sensor (e.g., by capturing sound caused by the tactile input orcapturing voice command), accelerometer (e.g., by measuring the speed oracceleration of a movement of the apparatus caused by the tactile input,such as sudden dropping or shaking of the apparatus or the seconddevice), proximity (e.g., by measuring the position change of theapparatus caused by the tactile input, such as sudden movement of theapparatus and/or the second device in certain pattern), and/or contactintensity sensors of the apparatus and/or the second device. In theembodiments in which the tactile input is received by the second device,the apparatus obtains the information associated with the tactile inputfrom the second device through the communication interface between theapparatus and the second device, e.g., through a communication channelincluding the communication device 114 (FIG. 1) of the user equipment110 (FIG. 1) and the local communication device 140 (FIG. 1) of theactive case 120 (FIG. 1).

In some embodiments, as represented by block 520, the method 500includes determining whether or not the tactile input matches apredefined input pattern. In some embodiments, the user predefines aninput pattern that triggers the distress mode discreetly, e.g., a touchinput on a touch-sensitive surface of the active case and/or the userequipment that matches a predefined touch input pattern. Differentgestures on the touch-sensitive surface have different touch inputpatterns (e.g., different locations, motions, timings, speed,acceleration, and/or intensities of detected contacts). For example, afinger tap gesture pattern includes detecting a finger-down eventfollowed by detecting a finger-up (lift off) event at the same position(or substantially the same position) as the finger-down event (e.g., atthe position of an icon or a portion of a touch-sensitive surface). Adouble-tap pattern, for example, comprises a first touch (touch begin)on a contact point of the touch-sensitive surface for a predeterminedphase, a first lift-off (touch end) for a predetermined phase, a secondtouch (touch begin) on the same contact point or within a predefineddistance from the contact point for a predetermined phase, and a secondlift-off (touch end) for a predetermined phase. In some embodiments, theduration between each successive touch input in a multi-tap inputpattern is less than a predetermined amount, such as less than afraction of a second. For example, a two-finger quadruple-tap pattern isfour two-finger taps in rapid succession. In some embodiments, thepredefined input pattern is a light press and/or a deep press at apredefined region of the touch-sensitive surface of the apparatus, e.g.,when a contact is detected with a contact intensity above the lightpress intensity threshold and/or a deep press intensity threshold. Insome embodiments, the predefined input pattern is associated with abutton or certain part of the active case. In yet some otherembodiments, the predefined input pattern is a predefined movementpattern, such as shaking the apparatus and/or the second device incertain way.

In some embodiments, when the tactile input matches the predefined inputpattern (“Yes” path from block 520), the method 500 includes directingthe second device to generate a distress response, as represented byblock 530. On the other hand, with reference to block 520, if thetactile input does not match the predefined input pattern (“No” pathfrom block 520), the method 500 includes circling back to the portion ofthe method 500 represented by block 510, where the apparatus (e.g., theactive case 120) continues to monitor the second device (e.g., the userequipment 110).

In some embodiments, when the second device (e.g., the user equipment110) enters the distress mode and/or generates the distress response,the second device (e.g., the user equipment 110) can be locked,disabled, turned off, enabled to transmit distress beacons, and/ordirected to communicate with emergency services (e.g., dialing 911and/or transmitting geographic location information). For example, theactive case 120 (FIG. 1) can direct the user equipment 110 (e.g., viathe local communication device(s) 140, FIG. 1) to disable or block theone or more communication channels of the user equipment 110 in order toprotect the user equipment 110. In another example, the active case 120(FIG. 1) can direct the user equipment 110 (FIG. 1) to erase or hidecertain data or applications from the memory 111 (FIG. 1) of the userequipment 110 and/or the memory 130 (FIG. 1) of the active case 120 inorder to protect the user equipment 110. In other words, upon activatingthe distress mode, sensitive data on the user equipment 110 and/or theactive case 120 are destructed or hidden so that a third-party, whoattempts to obtain the sensitive data from the user equipment 110,cannot reach such data.

In some embodiments, as represented by block 532, directing the seconddevice to activate a distress mode and/or to generate a distressresponse includes issuing a first electronic signal to change the seconddevice from a first communication mode (e.g., waking up the userequipment 110 from an airplane mode) to a second communication mode(e.g., enabling Bluetooth communication). For example, when the userequipment is in the airplane mode, communication channel(s) between theactive case and the user equipment may be turned off. In the distressmode, the controller 122 (FIG. 1) of the active case 120 (FIG. 1) canissue a signal to wake up the user equipment 110, so that thecommunication device 114 (FIG. 1) (e.g., Bluetooth) on the userequipment 110 can be enabled and a communication channel can be enabled.

In some embodiments, in order to establish the communication channel,the apparatus also changes its communication mode. For example, theapparatus can be in the first communication mode (e.g., the airplanemode) when the controller 122 (FIG. 1) determines to activate thedistress mode. In some embodiments, in the airplane mode, the activecase 120 disables its communication devices so that RF emissions are notdetectable. In such embodiments, in the distress mode, the controller122 (FIG. 1) transitions out of or exits the first communication mode toenable the local communication device 140 (FIG. 1). Consequently, thecommunication channel between the user equipment 110 (FIG. 1) and theactive case 120 (FIG. 1) can be established through the enabledcommunication device 114 (FIG. 1) and the local communication device 140(FIG. 1).

Upon enabling the communication channel, the active case 120 (FIG. 1)can then issue the first electronic signal and communicate the firstelectronic signal through the enabled communication channel to the userequipment 110 (FIG. 1). In some embodiments, the active case 120(FIG. 1) can send another electronic signal to direct the user equipment110 (FIG. 1) to generate the distress response. In some embodiments, aspart of the distress response, the active case 120 retrieves necessaryinformation from the user equipment 110 (e.g., the SIM information) andtransmits such information to a remote source (e.g., the secure basestation 320 in FIG. 3 and/or the secure base station 440 in FIG. 4).

In some embodiments, as represented by block 540, the method 500includes transmitting to the remote source a location, a timestamp, andsignal strength information for threat location map generation. Forexample, in a multi-user setting, as shown in FIG. 3, each active case120 sends RSSI, time, and geolocation to the secure base station 320, sothat the secure base station 320 can triangulate and generate a threatlocation map including locations of RF transmitters. The threat locationmap identifies the high threat area 330 around the potentially maliciousRF emitter 310. Upon request or periodically, the threat location mapincluding the location of the RF emitter 310 and the associated highthreat area 330 is provided to the active cases 120.

In some embodiments, as represented by block 550, the method 500includes comparing the information contained in the threat location mapwith movement and location information of the apparatus (e.g., thedirection the apparatus is moving, the speed the apparatus is moving,etc., as shown in FIG. 4) and determining whether to direct the seconddevice to enter a distress mode based on the comparison. In someembodiments, in response to determining that the apparatus holding thesecond device is entering or projected to enter the high threat area(“Yes” path from block 550), the method 500 includes directing thesecond device to the distress mode, as represented by block 560. On theother hand, with reference to block 550, if the apparatus holding thesecond device is not entering or is not projected to be within athreshold distance from the high threat area (e.g., the high threat area420-1 is not along the path 410 of the active case 120 as shown in FIG.4) (“No” path from block 550), the method 500 includes circling back tothe portion of the method 500 represented by block 510, where theapparatus continues to monitor the second device.

In some embodiments, as represented by block 570, the method 500includes monitoring the movement and location of the apparatus anddetermining whether the second device is exiting the high threat area.In some embodiments, in response to determining that the apparatusholding the second device is exiting the high threat area (“Yes” pathfrom block 570), the method 500 includes directing the second device toexit the distress mode, as represented by block 580. On the other hand,with reference to block 570, if the apparatus holding the second deviceis not exiting the high threat area (“No” path from block 550), themethod 500 includes circling back to the portion of the method 500represented by block 560, where the second device remains in thedistress mode and the apparatus continues to monitor the second device.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the invention and its practical applications, to therebyenable others skilled in the art to best use the invention and variousdescribed embodiments with various modifications as are suited to theparticular use contemplated.

What is claimed is:
 1. An apparatus comprising: a housing arranged tohold a second device; one or more sensors, at least partially supportedby the housing, operable to obtain threat analysis data; a communicationinterface, at least partially supported by the housing and connectableto the second device, operable to communicate with the second device;and a controller, coupled to the communication interface and the one ormore sensors, operable to, based on a policy and the threat analysisdata, direct the second device, through the communication interface, toenter a distress response mode without user intervention, monitor thesecond device after the second device entered the distress responsemode, and direct the second device to exit the distress response modebased on the policy.
 2. The apparatus of claim 1, wherein the threatanalysis data includes sensor data, and the controller is furtheroperable to: obtain, through the communication interface, the sensordata from the second device.
 3. The apparatus of claim 1, wherein thedistress response includes one or more of locking, shutting off,transmitting distress beacons from, communicating with emergencyservices from, or disabling the second device.
 4. The apparatus of claim1, wherein the housing includes a housing assembly with one or moremoveable components, when the one or more moveable components is in afirst position, the controller is operable to: without userintervention, monitor the second device using the threat analysis dataregardless whether or not the second device is in the distress responsemode.
 5. The apparatus of claim 1, wherein: the threat analysis datainclude at least one of a tactile input, movements, or locations; andthe policy specifies at least one of characteristics of predefined inputpatterns, characteristics of movement patterns, or threshold time ordistance from the locations.
 6. The apparatus of claim 1, furthercomprising one or more remote communication devices at least partiallysupported by the housing, and the controller is further operable to:cause the one or more remote communication devices to transmit thethreat analysis data to a remote source; and receive, via the one ormore remote communication devices, derived data for determining whetheror not to enter the distress response mode, wherein the remote resourcegenerates the derived data based on the threat analysis data from aplurality of the apparatus.
 7. A method comprising: at an apparatusincluding a controller, one or more sensors, a communication interface,and a housing arranged to hold a second device: obtaining threatanalysis data from at least one of the one or more sensors or the seconddevice; determining whether or not the threat analysis data satisfy apolicy; in response to a determination that the threat analysis datasatisfying the policy, directing the second device to enter a distressresponse mode without user intervention; monitoring the second deviceafter the second device entered the distress response mode; anddirecting the second device to exit the distress response mode based onthe policy.
 8. The method of claim 7, wherein the threat analysis dataincludes sensor data, and the method further includes: obtaining,through the communication interface, the sensor data from the seconddevice.
 9. The method of claim 7, wherein the distress response includesone or more of locking, shutting off, transmitting distress beaconsfrom, communicating with emergency services from, or disabling thesecond device.
 10. The method of claim 7, wherein the housing includes ahousing assembly with one or more moveable components, when the one ormore moveable components is in a first position, the controller isoperable to: without user intervention, monitor the second device usingthe threat analysis data regardless whether or not the second device isin the distress response mode.
 11. The method of claim 7, wherein: thethreat analysis data include at least one of a tactile input, movements,or locations; and the policy specifies at least one of characteristicsof predefined input patterns, characteristics of movement patterns, orthreshold time or distance from the locations.
 12. The method of claim7, wherein the apparatus further includes one or more remotecommunication devices that are at least partially supported by thehousing, and the method further includes: cause the one or more remotecommunication devices to transmit the threat analysis data to a remotesource; and receive, via the one or more remote communication devices,derived data for determining whether or not to enter the distressresponse mode, wherein the remote resource generates the derived databased on the threat analysis data from a plurality of the apparatus. 13.A non-transitory memory storing one or more programs, which whenexecuted by one or more controllers of an apparatus with one or moresensors, a communication interface, and a housing arranged to hold asecond device, cause the apparatus to: obtain threat analysis data fromat least one of the one or more sensors or the second device; determinewhether or not the threat analysis data satisfy a policy; in response toa determination that the threat analysis data satisfying the policy,direct the second device to enter a distress response mode without userintervention; monitor the second device after the second device enteredthe distress response mode; and direct the second device to exit thedistress response mode based on the policy.
 14. The non-transitorymemory of claim 13, wherein the threat analysis data includes sensordata, and the one or more programs further cause the apparatus to:obtain, through the communication interface, the sensor data from thesecond device.
 15. The non-transitory memory of claim 13, wherein thedistress response includes one or more of locking, shutting off,transmitting distress beacons from, communicating with emergencyservices from, or disabling the second device.
 16. The non-transitorymemory of claim 13, wherein the housing includes a housing assembly withone or more moveable components, when the one or more moveablecomponents is in a first position, the one or more programs furthercause the apparatus to: without user intervention, monitor the seconddevice using the threat analysis data regardless whether or not thesecond device is in the distress response mode.
 17. The non-transitorymemory of claim 13, wherein: the threat analysis data include at leastone of a tactile input, movements, or locations; and the policyspecifies at least one of characteristics of predefined input patterns,characteristics of movement patterns, or threshold time or distance fromthe locations.
 18. The non-transitory memory of claim 13, wherein theapparatus further includes one or more remote communication devices atleast partially supported by the housing, and the one or more programsfurther cause the apparatus to: cause the one or more remotecommunication devices to transmit the threat analysis data to a remotesource; and receive, via the one or more remote communication devices,derived data for determining whether or not to enter the distressresponse mode, wherein the remote resource generates the derived databased on the threat analysis data from a plurality of the apparatus.