Security system and method for a mobile phone

a mobile phone and security system technology, applied in the field of security systems and methods, can solve the problem of nothing that can be done to prevent unauthorized access to private information on the mobile phon

Inactive Publication Date: 2009-04-16
CHI MEI COMM SYST INC
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a way that a mobile device can be used safely when it's being charged with sensitive data like credit card details. It includes a set of rules for different types of access (PIN) numbers, encryption modules, locking mechanisms, and work start/end modules. These components help protect against unauthorized access from people who shouldn't have their own personal identification cards.

Problems solved by technology

This patent describes how current mobile devices with advanced functionalities like phone books, rings, and other security features are vulnerable to being copied without their owners' permission. There needs a way to secure these devices while only allowing authorized users to access them.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system and method for a mobile phone
  • Security system and method for a mobile phone
  • Security system and method for a mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]FIG. 1 is a block diagram of one embodiment a mobile phone 1 comprising a security system 10. The security system 10 is configured for setting security measurements for the mobile phone 1. The security measurements, in one embodiment comprises setting least two PIN numbers, encrypting an electronic phone book system (shown in FIG. 5) of the mobile phone 1, setting a security status for each contact in the phone book system, and starting a secure work mode of the mobile phone 1. Further details of these security measurements will be explained in further detail herein.

[0016]The encrypted phone book system includes information about an identification (ID) name, address, phone number(s), and security status for each contact in the phone book system. For example, in FIG. 6, a contact has an ID name “Peter,” an address “Shenzhen,” a phone number “135432546,” and a security status “yes.” In other words, a call and a message from Peter may be placed and / or sent as a secured call and a

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security system for a mobile phone is disclosed for securing private information of the mobile phone. The system may set at least two PIN numbers for a super user and a general user, encrypt a phone book system of the mobile phone by setting a security status for each contact in a phone book system of the mobile phone. The system also may start a secure work mode if a user of the mobile phone is a super user and starting a non-secure work mode if the user is a general user of the mobile phone. A security method for a mobile phone is also disclosed.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner CHI MEI COMM SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products