Security for mobile system
First Claim
Patent Images
1. A programmable management method for a mobile device, the method comprising:
- proactively monitoring current and anticipated values of;
user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental sensory information, biological sensory information, or combinations thereof, wherein said proactive monitoring is performed continually while the device is in operation and without request for user input;
generating a security level for the present time based on said monitoring; and
upgrading said security level based on detecting a discrepancy between said current and anticipated values, failure to perform a planned activity, failure to correctly respond to alerts, owner'"'"'s request or combinations thereof; and
upon upgrading said security level, performing a multi-phase security handling procedure, wherein said procedure includes;
a first security phase to establish a user identity via a user biological identification, user inquiry, user location identification, or combinations thereof;
a second security phase including a device locking operation, a content backup operation, an owner notification operation via a predefined method, or combinations thereof; and
a third security phase including notifying another party, tracking the location of mobile device, activity detected on the mobile device, proximity, environmental information, capturing user'"'"'s biological information, user'"'"'s photograph, reporting said information to owner or another party, or combinations thereof;
wherein each of said security phases is followed by a next security phase upon failure to pass one or more of previously performed security checks of the first phase, a predetermined schedule, user'"'"'s input or combinations thereof.
0 Assignments
0 Petitions
Accused Products
Abstract
An automated mobile assistant system provides automated, proactive and anticipatory services for the user of the system. A customizable personal mobile device for communication, entertainment and organization includes a core engine and a plurality of modules coupled to the core engine to perform a different one of a plurality of classes of functionality of the mobile device, where each said module includes a processing element and memory dedicated for use by said module. A time-based intelligence system provides robust storage, access, and processing of information on a mobile device.
59 Citations
17 Claims
-
1. A programmable management method for a mobile device, the method comprising:
-
proactively monitoring current and anticipated values of;
user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental sensory information, biological sensory information, or combinations thereof, wherein said proactive monitoring is performed continually while the device is in operation and without request for user input;generating a security level for the present time based on said monitoring; and upgrading said security level based on detecting a discrepancy between said current and anticipated values, failure to perform a planned activity, failure to correctly respond to alerts, owner'"'"'s request or combinations thereof; and upon upgrading said security level, performing a multi-phase security handling procedure, wherein said procedure includes; a first security phase to establish a user identity via a user biological identification, user inquiry, user location identification, or combinations thereof; a second security phase including a device locking operation, a content backup operation, an owner notification operation via a predefined method, or combinations thereof; and a third security phase including notifying another party, tracking the location of mobile device, activity detected on the mobile device, proximity, environmental information, capturing user'"'"'s biological information, user'"'"'s photograph, reporting said information to owner or another party, or combinations thereof; wherein each of said security phases is followed by a next security phase upon failure to pass one or more of previously performed security checks of the first phase, a predetermined schedule, user'"'"'s input or combinations thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A programmable management method for an electronic device, the method comprising:
-
storing one or more of biological identifications associated with authorized users, and storing a passkey comprising a pre-determined time pattern, spatial pattern or combinations thereof of biological identification inputs; monitoring a sequence of biological identification inputs;
monitoring the time pattern and spatial pattern of said inputs;upon attempting to authenticate, performing security actions including capturing biological, environmental, sensory information, user photograph or video, notifying owner or another party, or combinations thereof; authenticating a user on the system upon detecting a match between the biological identification input entries and authorized biological identifications stored in memory and further upon detecting a match between the time pattern and spatial pattern of the sequence of biological identification inputs with said pattern stored in passkey in memory; and upon authenticating a user, granting entry to a physical location or granting access to items stored within a physical location, and upon authenticating a user, optionally granting access for a predefined duration, and upon failing to detect a match to authenticate the user, or upon meeting said predefined duration, performing one or more of additional security actions including locking access to said physical location including entry and exit, capturing additional sensory information, capturing user photograph or video, notifying owner or authorities, or combinations thereof, and uploading said tracking and captured information locally or remotely, wiping off said local information, or combinations thereof, and granting access to said tracking and captured information upon additional authentication.
-
-
11. A mobile electronic system, comprising:
-
at least one processing element; at least one memory element operably connected to the processing element; one or more of a display, a camera, environmental sensors, and biological sensors; wherein said system proactively monitors current and anticipated values of;
user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental sensory information, biological sensory information, or combinations thereof;
wherein said proactive monitoring is performed after initial set up and continually while the device is in operation and without request for user input;wherein said system generates a security level for the present time based on said monitoring and upgrades said security level based on detecting a discrepancy between said current and anticipated values, failure to perform a planned activity, failure to correctly respond to alerts, owner'"'"'s request or combinations thereof; and upon upgrading said security level, said mobile system performs a multi-phase security handling procedure, wherein said procedure includes a first security phase to establish a user identity via a user biological identification, user inquiry, user location identification, or combinations thereof; said procedure includes a second security phase including a device locking operation, a content backup operation, an owner notification operation via a predefined method, or combinations thereof; said procedure includes a third security phase including notifying another party, tracking the location of mobile device, activity detected on the mobile device, proximity, environmental information, capturing user'"'"'s biological information, user'"'"'s photograph, reporting said information to owner or another party, or combinations thereof; and wherein each of said security phases is followed by a next security phase upon failure to pass one or more of previously performed security checks of first phase, a predetermined schedule, user'"'"'s input or combinations thereof.
-
-
12. A mobile electronic system, comprising:
-
at least one processing element, at least one memory element operably connected to the processing element, one or more of a display, a camera, environmental sensors, and biological sensors, wherein said memory stores one or more of biological identifications associated with authorized users, and wherein said memory further stores a passkey comprising a pre-determined time pattern, spatial pattern or combinations thereof of biological identification inputs; and wherein said system monitors a sequence of biological identification inputs, the time pattern and spatial pattern of said inputs, wherein upon attempting to authenticate, said system performs security actions including capturing biological, environmental, sensory information, user photograph or video, notifying owner or another party, or combinations thereof; wherein said system authenticates the user upon detecting a match between the biological identification input entries and authorized biological identifications stored in said memory and further upon detecting a match between the time pattern and spatial pattern of the sequence of biological identification inputs with said pattern stored in passkey in said memory; and wherein upon successful user authentication, said system grants entry to a physical location or to items stored within a physical location, wherein upon authenticating the user optionally grants access for a predefined duration, and upon failing to detect a match and authenticating the user, or upon meeting said duration, said system performs one or more of additional security actions including locking access to said physical location including entry and exit, capturing additional sensory information, capturing user photograph or video, notifying owner or authorities, or combinations thereof, and uploading said tracking and captured information locally or remotely, wiping off said local information, or combinations thereof, and grants access to said tracking and captured information upon additional authentication.
-
-
13. A mobile device, comprising:
-
at least one processing element, at least one memory element operably connected to the processing element, one or more of a display, a camera, environmental sensors, and biological sensors, wherein the device performs automated security procedure including, detection, breach verification, and protection, wherein said security procedure is performed after initial setup and while the device is in operation, or upon certain events requiring further user authentication including user signature; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes capturing current user'"'"'s biometric information, fingerprint, photograph without prompting or notifying the user, comparing said captured information against anticipated user'"'"'s information, upon detecting a discrepancy and verifying a breach, protection is performed; wherein protection includes storing captured data for said current user of the device including biometric, fingerprint, photograph in said memory element, transmit said information to a third party or combinations thereof without notifying the current user of the device; wherein protection further includes actions to protect device owner'"'"'s data from a predetermined set of actions.
-
-
14. A programmable management method for a mobile device, comprising:
-
performing automated security procedure including, detection, breach verification, and protection, wherein said security procedure is performed after initial setup and while the device is in operation, or upon certain events requiring further user authentication including user signature; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes capturing current user'"'"'s biometric information, fingerprint, photograph without prompting or notifying the user, comparing said captured information against anticipated user'"'"'s information, upon detecting a discrepancy and verifying a breach, protection is performed; wherein protection includes storing captured data for said current user of the device including biometric, fingerprint, photograph in said memory element, transmit said information to a third party or combinations thereof without notifying the current user of the device; wherein protection further includes actions to protect device owner'"'"'s data from a predetermined set of actions. - View Dependent Claims (15)
-
-
16. A programmable management system, comprising:
-
an electronic device, one or more of a display, a camera, environmental sensors, and biological sensors coupled to the electronic device, wherein the system performs automated security procedure including, detection, breach verification, and protection, wherein said security procedure is performed after initial setup and while the electronic device is in operation, or upon certain events requiring further user authentication including user signature; wherein detection includes detecting discrepancy between current and anticipated values of at least one of user location, activity, proximity to other users or events or locations, planned activities, usage pattern, environmental and biological sensory information, or combinations thereof;
wherein upon discrepancy detection, breach verification is performed;wherein breach verification includes capturing current user'"'"'s biometric information, fingerprint, photograph without prompting or notifying the user, comparing said captured information against anticipated user'"'"'s information, upon detecting a discrepancy and verifying a breach, protection is performed; wherein protection includes storing captured data for said current user of the device including biometric, fingerprint, photograph in said memory element, transmit said information to a third party or combinations thereof without notifying the current user of the device; wherein protection further includes actions to protect device owner'"'"'s data from a predetermined set of actions. - View Dependent Claims (17)
-
Specification