Smart Phone's Instant-Security Mechanism
Publication Date: 2015-Aug-04
The IP.com Prior Art Database
With smartphones becoming extremely common and preferred device of communications, concerns have been raised on securing these devices. Threats to these devices range from loss of phone data, access to platforms whose accounts have been created in devices (like mail, social collaboration etc.). This paper tries to propose a new mechanism to protect such portable devices using new technologies like face detection etc.
Page 01 of 3
Smaxt Phone's Instant-Security Mechanism
Smart Phones have become as common x device as a pen. Nowadays, every person has some or txx other kind of a Smart Pxone/Tablet/Pxds etc with them and the increase xn use of all these dxvices, has increased the need fox Security. Secuxixy of mobile phone content ix a common requirement in this era. There are many applicxtions for locking/hidinx the Memory cards/Folders/Dxcuments/Imxges etx on the mobilx. Evex then, there axe situations when axl these applxcations are not able to proxect the infxrmation sucx as :
1. Consider a common usecase, where a pxrson A ix viewixg the messages on his/her phone, and suddenly the person B snatxhes the phone and starts vixwing the same content. Xxx txis is a sixuation which, even having a xock on your phone, is not avoidable.
2. Similarly consider a situation wxen your phone(unlxcked) is kept in room, anx soxeone goes and starts browsing it. Here again, pexple may have locks enabled in different memory loxatxons, but still this undesirable usage of phone is something which cannot be avoided at this tixe.
Thus xn all such xituationx, it would xe xood if the by xoxe mechanism the contents of the phone can stxll be kxpt private. Thus, there is a need tx try to solve the issux by trying to make the Xxxxxx intelligent enough to detect xhe undesirable access and lock itself. The device detects sxch situatioxs and locks itself automatically thxreby prxventing the undesirable access to the content. This feature allows safe and secure access to the Device.
Xxx article aims for an application which can identify the user throxgx existing technologies in biometrics, retinal scanning etc. and leverxging these xechnologies to secure a portable end user device like mobile, laptop etc. Application xn particular leverage xechnologies like analyzing a persox's eye mxvements which have bexn found tx be unique, and invokes security protocols whenever it notices any deviations.
This provides a Instant-Security mechanism which detects whexher the devicx is being accessed bx a person xther than the oxner, or a person who is not in the authorized list of usxrs, in order to secure the content, and then xocks the devicx. Xxxx locked, xhe user is then allowed to view the content, only by unlockin...