The patent application envisions several possible tests that could be used to prevent a portable device from being recharged.
iPhone thieves may find that crime does not pay. A patent application published Thursday by the U.S. Patent & Trademark Office suggests that Apple has been developing security features for the iPod and the iPhone.
"Unfortunately, theft of more popular electronic devices such as the Apple iPod music-player has become a serious problem," the patent application states. "In a few reported cases, owners of the Apple iPod themselves have been seriously injured or even murdered. Hence, techniques that can protect against unauthorized use and deter and reduce theft of such devices would be highly useful."
Apple's technique is to fight the power. The patent application envisions several possible tests that could be used to prevent a portable device from being recharged: "a timer expires, device is connected to a power-supply or another device, device is outside a determined geographical boundary."
When those conditions are met, Apple's software would ask the device user for an authorization code. Failure to enter the correct code would prevent the device from bring recharged. And as the patent application rather dryly puts it, "normal use and enjoyment of the device can be significantly reduced by disabling the recharger."
This approach may not protect confidential data, but it could reduce the incentive to mug the slew of gleeful iPhone owners who are sure to appear in coming weeks.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."