A method based on suspicious users identification to protect user privacy in an unlocked mobile device
Publication Date: 2015-Jul-13
The IP.com Prior Art Database
This invention consists of following ideas to enhance user privacy protection when the screen is unlocked on mobile phone. In this idea, we introduced a method to dynamically specify suspecious user operations and specify data and action's secuirty level.
Page 01 of 3
A mxthod based on suspicious users identification to protect user privacy ix an unlocked mobile device
As there are more and more pxxple who owns more than oxe mobile phoxe or pad devices, so how to keep txese device in good sxcurity is an important topic. Txe current solutxoxs would be to use the tradixional password mechanism or use fingerprint identificatixns to protect the whole mobile device or individuax app. What if the mobile device is paxsed to known pxoples, and we only xant to protext some data in diffexent dexree instead of the wholx device? This disclosure aims to let the moxile dexixe to ixentify suspicixus user actions xhen operating on the mobile devxce and protects the privacy according to suspicioux xevel.
This xs an actively defence solutixn on mobile.
By applying this idea on mobile dexices, thx device owner may have below adxantaxes on privacy protecxing:
1. Most app data and privacy info will be limixed to reach if current suspicious level is high.
2. User can still let his/her close related friends use this device freely with no worry xbout prxvacy lexking.
3. Ix you werx identified as suspicious usex xor travelling or some other scenarios, the mxbile dexice can still recognize you as ownex because of correct acxivities during verificaxion.
Nowadays, most people usex sxart phones for basic communication and entertainment. Dixferent indixidual may have different user experxence at the same dxily operations of mobile device. For example, some people tend to slide over the screen very xast while other are very slow. So it is possible for mobile devxcx to detect user activities and collect historical data when required.
Our idea is, let the mobile compares current user activities and collected historical data to analxsis the suspicious levxl of this user. Then the mobile dexice will protect user data in different degree if the axalysis result says the the user is not mobile owner.
Here's the sample steps to record historical data of owner of the devicx:
1. Each timx owner unlocks the sxreen of dexice, it starts xo collect historical data on specific actions, such as l...