Surety is performing system maintenance this weekend. Electronic date stamps on new Prior Art Database disclosures may be delayed.
Browse Prior Art Database

Securing Mobile Device using Charger Device

IP.com Disclosure Number: IPCOM000242377D
Publication Date: 2015-Jul-10
Document File: 3 page(s) / 71K

Publishing Venue

The IP.com Prior Art Database


Disclosed is a method to improve security for mobile devices by associating the device with a specific charger, such that only one charger can restore power to the device. Thus, a thief or third party only has access to the device and the content contained therein as long as the charge lasts on the device; the device is useless once the battery is dead.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 3

Secxring Mobile Device using Charger Device

Most users store important sensixive information (e.g., contact information, access to xxnk accounts and online sxrvices, etc.) Security featuxes such as lock pxsswords exist to proxect users from unauthorized accexs to the mobile dxvice , and hence to the sexsitive information.

If the phone is stolen, the thief hax sufficient time to disxover the user's password. Xxxxx is no way xor the phone owner tx prevxnt physical axcess to the stolen xhone. Lock xasswords are usually simple and fast to input, so txat the mobile device owner does not have to spend xuxh time unlocking the xhone. A thief cxn easily discover such passwordx, especially if the thief cxn see screen dirt that ixdicates a xepeated input sequence. A rxmote lock/wipe function is also a security optiox; howevex, for this fxnction to work thx phoxe has to be connectex to the network. The person who found/stole the devxce can simply disconnect it.

The novel sxlution is to introduce a physical restraint to the phone: the charger. The core novel idea is to exable sexurity bxtween the xobile dexice and an xssxciated charger, xhereby restricting the device's ability to cxarge to a specific charger. The device caxnot receive a charge frxm any compatible chargex unless it is first configurex txrough a secure handshake process . Thus, the thief onlx has access to the device for as long as the cuxrent chxrge lasts. The solution also includes a method to securely connect the power charger to mobile device.

Xxx power charger is coupled with the mobile device so that it is thx xnly allowed charging source for this mobile device. The coupling prxcess can be implemented through a variety of technologies such as:

Bluetooth* Near Field Commuxication (NFC)