Browse Prior Art Database

A smart method to secure specific content in the mobile phone

IP.com Disclosure Number: IPCOM000201554D
Publication Date: 2010-Nov-15
Document File: 2 page(s) / 41K

Publishing Venue

The IP.com Prior Art Database

Abstract

Mobile computing is getting pervasive day by day. Mobile handsets available in the market today are no less than a Personal Computer, with the kind of data they store and kind of applications one can install on the mobiles.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

A smart method to secure specific content in the mobile phone

Mobile phones have a set of pre-defined profiles which user can switch based on what he is doing. A standard set of profiles which phones provide are Silent, Vibrate, General, Outdoors, Meeting, Offline etc. The profile basically control the way the phone notifications happen when you activate the profile corresponding to the location you are in.

The invention works as follows
The phones allow the users to customize the profile or create new profiles as per users preference. The method proposes that we attach 2 additional attributes with the profile

passwor

d

       - a sequence of alphanumeric characters
security-level - an integer between 0 to 10 (can be extended if need be),

Similarly every item on the device that needs to be secured also have the security-level attribute.

The security level for an item means that the item will be visible to the profiles which have a security level equal to or higher than that of the item. Similarly a security level for the profile means that the profile can be used to view all the items that have a security level equal to or less than that of the profile.

User creates a new profile and assigns a password and a security level to the profile. User then assigns same security level as that of the profile to the items which he wants to be restricted to this profile.

Whenever the user wants to access the information that is secured he/she would need to activate that profile by entering the password. once the profile is activated the phone can be used as if a user with a particular set of privileges has logged into the system

Below are a few other scenarios that would need solution
1. What happens when user gets a call from a contact whose security level is higher that the security level of the active profile

In such a scenario one of the following things can be done
User can be allowed to answer the call without displaying the number
User is prompted to enter the password for the profile under which the caller is registered
User is given options to choose the mod...