The patent application says that ways the technology would determine if an unauthorized user had the phone include identifying activities such as hacking, jailbreaking, unlocking, removing the SIM card and moving a predetermined distance from a synced device.