×

Automated mobile system

  • US 8,311,513 B1
  • Filed: 08/18/2008
  • Issued: 11/13/2012
  • Est. Priority Date: 06/27/2007
  • Status: Active Grant
First Claim
Patent Images

1. An autonomous and programmable management system for a mobile device, comprising:

  • a memory to store requests;

    a scheduler to dynamically and proactively initiate and prioritize requests using temporal, geographical, contextual, availability, user-preference, past activities, usage pattern, or combinations thereof; and

    a manager to automatically perform requests in real-time, wherein said manager performs at least one request without prompting for user input; and

    wherein the manager performs automated security procedure including;

    detection, breach verification, and protection,wherein said security procedure is performed after initial setup and while the device is in operation;

    wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;

    wherein upon discrepancy detection, breach verification is performed;

    wherein breach verification includes performing security breach confirmation using at least one of a transparent authentication process and non-transparent authentication process including at least one of user-inquiry and biological identification,wherein transparent authentication processes include direct user inquires to identify the system user by direct knowledge of user-specific information, performing biological, biometric checks or combinations thereof and wherein the user is aware the system is performing authentication checks to continue granting access to the system by the user;

    wherein non-transparent authentication processes include performing authentication procedures known or unknown to the user and wherein the user is unaware the authentication procedures are taking place and wherein the authentication checks include performing biological checks, biometric checks or combinations thereof without making user notifications, to continue granting access to the system;

    wherein upon confirmation of breach, protection is performed;

    wherein protection includes security breach handling procedure that performs actions to protect user data chosen from a predetermined set of actions including user selection; and

    wherein upon detection of breach, the system optionally does not notify or alarm the fraudulent user of a breach detection thus making the detection and security handling procedure non-transparent to the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×