Apple patent kills wireless, video and camera functions

Powered by SC Magazine
 

Remote censor technology aimed at private business, academia, and government.

A new Apple patent granted last month could allow organisations to remotely terminate wireless transmissions and cut camera functions on iPhones.

The US patent (8254902) described as “apparatus and methods for enforcement of policies upon a wireless device" would allow organisations to remotely enforce “operational policies on a wireless device upon the occurrence of a certain condition”.

The patent included the ability to force devices into “sleep mode when entering a sensitive area".

It could also force devices into a “lockdown mode”, blocking camera and video functionality to prevent “surreptitious imaging”.

Apple sought to grant customers “willing to pay extra …the peace of mind associated with knowing that they are not being secretly photographed”.

Apple’s patent, first spotted by CNET US, could allow policies to be triggered “upon the occurrence of a certain event”, including “detecting that the wireless device is within range of one or more other devices” or “associating with a certain access point”.

This would be useful to terminate light and sounds in a movie theatre and to block wireless communications during exams, according to the patent.

It would be also useful for “covert police or government operations [that] may require complete ‘blackout’ conditions” and for airline operators to block phone access during flights and terrorist threats.

Copyright © SC Magazine, Australia


Apple patent kills wireless, video and camera functions
 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote