Browse Prior Art Database

Methods and systems for data protection on mobile devices using existing sockets

IP.com Disclosure Number: IPCOM000237972D
Publication Date: 2014-Jul-23
Document File: 2 page(s) / 21K

Publishing Venue

The IP.com Prior Art Database

Abstract

Methods and systems for data protection on mobile devices using existing sockets

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 56% of the total text.

Page 01 of 2

Methods and systems for data protection on mobile devices using existing sockets

    Devices like smartphones, tablets, and netbooks are now part of everyday life. A lot of information are contained in such devices, both business and personal. Let's think about e-mail, social networks, e-commerce and so on. Unfortunately, such devices are easily stolen by thieves. This is a problem because they could be in possession of our data, that can be personal data, or business data.

    Here is proposed a solution that aims to avoid such devices to be stolen. It leverages on port sockets of the device and on the programmability of the device itself. The solution can be easily installed and managed using an application installed on the device.

    An application running on the device manage a physical lock that can be installed in one of the sockets available on the device. The application behavior can be also customized making the device reactive to a given action.

The solution comprises two main components: the physical lock


1.

the managing application

2.

    The physical lock must fit into one of the device socket ports, and, at the same time, must allow the owner of the device to reuse the port for its purpose. Such ports are well known and standardized, and are present on most of the devices, like the mini-USB, or the ear-phones jack socket. The physical lock is made of three parts:
the cable


1.

the lock


2.

the control unit

3.

    The cable can be just a common cable that ends with a kno...