Apple To Patent iPhone Kill Switch - InformationWeek
Cloud // Software as a Service
09:18 AM

Apple To Patent iPhone Kill Switch

Technology would allow Apple to identify unauthorized users through facial, voice, and even heartbeat recognition software.

Apple has applied for a patent on technology that would allow it to detect unauthorized iPhone users and remotely terminate services to those devices.

Image Gallery: Apple iPhone 4, A True Teardown
(click for larger image and for full photo gallery)

The patent, revealed last week, covers a range of uses that Apple considers to be illegitimate, including "hacking, jailbreaking, unlocking, or removal of a SIM card," according to the application, filed with the United States Patent and Trademark Office.

The patent, which would also apply to the iPod Touch and iPad, also covers measures to identify the unauthorized user.

"A photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above," the patent states.

"The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match," the application continues.

"Sensitive information can be erased from the electronic device" if an unauthorized user is detected, the patent states.

The jailbreaking issue came to a head earlier this month after a hacker who goes by the name "comex" released an app, called Jailbreakme 2.0, that makes it easy for users with limited technical skills to run unauthorized, third-party apps on their iPhones.

Jailbreakme 2.0 works with iPhone 4, as well as iPhone 3GS and iPod Touch devices that have been upgraded to iOS 4, which is the newest operating system for Apple's mobile products. The developer is also working on a version for the iPad.

The Library of Congress recently ruled that jailbreaking is not a violation of the Digital Millennium Copyright Act and is therefore legal.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll