×

Mobile device with built-in access control functionality

  • US 10,216,913 B2
  • Filed: 05/19/2017
  • Issued: 02/26/2019
  • Est. Priority Date: 01/25/2017
  • Status: Active Grant
First Claim
Patent Images

1. A mobile device with built-in access control functionality comprising:

  • an access control unit that includesa storage module to which access is to be controlled, anda control module storinga permissions table configured to record a reference user identification (ID), and a user authority that corresponds to the reference user ID and that specifies what operation is allowed on said storage module, andan ID-password table configured to record the reference user ID and a reference user password that corresponds to the reference user ID;

    a memory unit that is configured to store an application program; and

    a processing unit that is electrically connected to said access control unit and said memory unit, and that is configured to execute instructions of the application program so as to transmit credential information associated with the application program to said access control unit in an attempt to gain access to said storage module;

    wherein when it is verified by said control module that the application program is authentic based on the credential information, said control module allows said processing unit to create data connection with said control module;

    wherein said processing unit which executes the instructions of the application program is configured to transmit an asserted user ID and an asserted user password to said control module;

    wherein said control module is configuredto look up in the permissions table the user authority based on the asserted user ID,to enable, when it is determined by the control module that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, said processing unit to perform the operation allowed on said storage module based on the user authority,to arrange storage spaces of a hidden area in said storage module,to enable said processing unit to establish, via said control module, a plurality of private spaces in said hidden area,to enable said processing unit to access said hidden area of said storage module when it is determined by said control module that the user authority thus looked up allows access to said hidden area and that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, andto enable, when it is determined by said control module that the user authority thus looked up allows access to at least one of said plurality of private spaces and that the asserted user ID and the asserted user password conform respectively to the reference user ID and the reference user password in the ID-password table, said processing unit to access said at least one of said plurality of private spaces, such that said control module is capable of encrypting data obtained from said processing unit and storing the data thus encrypted in said at least one of said plurality of private spaces, and is capable of decrypting data obtained from said at least one of said plurality of private spaces and transmitting the data thus decrypted to said processing unit.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×