Security for mobile and stationary electronic systems
First Claim
Patent Images
1. A programmable management method for a mobile device, the method comprising:
- proactively monitoring current and anticipated values of;
user location, activity, proximity to other users or events or locations, planned activities, usage pattern, biological sensory information, environmental sensory information, or combinations thereof, wherein said proactive monitoring is performed while the mobile device is in operation and without request for user input;
initiating security checks based on detecting a discrepancy between said current and anticipated values, and wherein upon failure of said security checks, performing a security procedure wherein the user is not alerted to said security procedure initiation, wherein said procedure includes biological and environmental sensory measurements to identify cases with an authorized user under duress, wherein duress is detected upon collected sensory data mismatching an expected value of said data, and upon said detection, restricting access to said mobile device to a predetermined mode in response to duress.
1 Assignment
0 Petitions
Accused Products
Abstract
An automated system and method for electronic systems is disclosed providing proactive and anticipatory autonomous security procedures for mobile device and stationary environments including hybrid security and authentication mechanisms.
-
Citations
11 Claims
-
1. A programmable management method for a mobile device, the method comprising:
proactively monitoring current and anticipated values of; user location, activity, proximity to other users or events or locations, planned activities, usage pattern, biological sensory information, environmental sensory information, or combinations thereof, wherein said proactive monitoring is performed while the mobile device is in operation and without request for user input; initiating security checks based on detecting a discrepancy between said current and anticipated values, and wherein upon failure of said security checks, performing a security procedure wherein the user is not alerted to said security procedure initiation, wherein said procedure includes biological and environmental sensory measurements to identify cases with an authorized user under duress, wherein duress is detected upon collected sensory data mismatching an expected value of said data, and upon said detection, restricting access to said mobile device to a predetermined mode in response to duress. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A programmable management method for an electronic system, the method comprising:
-
storing one or more of identifications associated with an authorized user, and further, monitoring a sequence of identification inputs, authenticating a user on the system upon detecting a match between the identification input entries and authorized identifications stored in memory and wherein authentication is further comprised of biological measurements or environmental sensory measurements including at least one of location, temperature, moisture, a user photograph, or heart rate, wherein said measurements are matched against expected values for a user under duress, and upon said match, further restricting access to a pre-determined duress mode, performing one or more of additional security actions including locking access to said system, capturing additional sensory information, capturing user photograph or video, notifying owner or authorities, or combinations thereof, wherein said actions are performed without notifying the user of the system, wherein duress mode access includes disabling access to user data and presenting cloned data to the user, and wherein cloned data is correct data, but the changes are not saved as changes to user information or data. - View Dependent Claims (8)
-
-
9. A programmable management method for a mobile device, the method comprising:
-
proactively monitoring current and anticipated values of; user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental sensory information, biological sensory information, or combinations thereof, wherein said proactive monitoring is performed while the mobile device is in operation and without request for user input; generating a security level based on said monitoring, and upgrading said security level based on detecting a discrepancy between said current and anticipated values, performing a security procedure upon said security level upgrade, upon failure to perform a planned activity, failure to correctly respond to alerts, at owner'"'"'s request or combinations thereof, wherein said security procedure includes non-transparent in addition to transparent security procedures, including performing of additional security actions without knowledge of the user of the system, wherein said security procedure includes performing one or more of additional security checks including biological and environmental sensory measurements to identify cases with an authorized user under duress, wherein duress is detected upon collected sensory data mismatching an expected set of values of said data, and wherein upon a match for a user under duress, further restricting access to a pre-determined duress mode. - View Dependent Claims (10, 11)
-
Specification