Browse Prior Art Database

Radio Transmitted Security System for Mobile Devices

IP.com Disclosure Number: IPCOM000123138D
Original Publication Date: 1998-Jun-01
Included in the Prior Art Database: 2005-Apr-04
Document File: 2 page(s) / 41K

Publishing Venue

IBM

Related People

Orita, R: AUTHOR

Abstract

This article describes a security system for mobile device that works only when it is in contact with human body of a restricted user. The user puts on a counter device, so these two devices make a pair to work by communicating with each other using radio waves transmitting through the user's body. This system makes it possible to restrict user's access without typing a password.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 100% of the total text.

Radio Transmitted Security System for Mobile Devices

   This article describes a security system for mobile device
that works only when it is in contact with human body of a
restricted user.  The user puts on a counter device, so these two
devices make a pair to work by communicating with each other using
radio waves transmitting through the user's body.  This system makes
it possible to restrict user's access without typing a password.

   The figure below shows an example of the system.  The
handheld device works only when the user puts the watch-type device
on the arm.  The casing of the handheld device and the back cover of
the watch are made of metal for radio wave transmission on human
skin.  The handheld device sends a key code to detect whether or not
the handheld device is in contact with user's body and while the
watch is on the arm.  If the handheld device acknowledges a response
from the watch and the response is an expected key code, the handheld
device allows the user to operate the device.  To operate the
handheld device, the user does not need to type any password but just
put the watch on.  As long as user does not put on the watch, any key
input, pointing device input or network communication are not
accepted.

   The application of this security system is not limited to
handheld device, but can be applied to cellular phones, keyboards
and mouse pointing devices.