Browse Prior Art Database

A method of preventing information leakage when in danger

IP.com Disclosure Number: IPCOM000247164D
Publication Date: 2016-Aug-11
Document File: 2 page(s) / 35K

Publishing Venue

The IP.com Prior Art Database

Abstract

Mobile devices provide unlocking functions directly using a fingerprint or inputting password. User can unlock mobile devices in short seconds. It’s convenience but unsafe. We propose a new function that uses fingerprint to lock the mobile devices in dangerous situations, so that be able to protect information stored in mobile devices and send out signal for help in a quick way when in danger.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 70% of the total text.

Page 01 of 2

A method of preventing information leakage when in danger

Nowadays, the mobile devices store so much important information, such as the personal accounts of banks, other payments accounts, or confidential documents.

Mobile devices provide unlocking functions directly using a fingerprint or inputting password. User can unlock mobile devices in short seconds. It's convenience but unsafe.

For example, in some dangerous situation, user may be compelled to unlock devices. Once user rejects, bad guys can grasp user'sfinger to unlock the devices, or force user to input the password. User can't destroy the information in a quick way.

Besides, in some other dangerous situation, such as a burglary, user can't ask for help from phone in a hiding way.

People like the storage and payment functions of mobile devices due to convenience. But it's difficult to balance convenience and safety. Therefore, we come up with a new function that can protect information stored in mobiledevices and send out signal for help ina quick way when in danger.

We use fingerprint to lock the mobile devices in dangerous situations. We call this locking fingerprint as LF .

To use this function, we should do some preparations:
1) Create a file called Protect , in this file, list all paths of documents, images and any items you want to protect.

2) Register a cloud account named ProtectAccount that can be used to store things you want to protect.

3) Create some messages EmergencyMessage and a list of em...