Unlock instant, AI-driven research and patent intelligence for your innovation.

Data terminal access control

An access restriction and terminal technology, applied in digital data authentication, electronic digital data processing, digital data processing components, etc., can solve the problems of not being able to develop uses as much as possible, leaking private information, deleting or recording information, etc.

Inactive Publication Date: 2009-08-05
NOKIA CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This risk can prevent terminal owners from passing on their terminal, thus preventing the device from being exploited to the fullest extent
The result is the risk of leaking private information and deleting or logging information (especially dynamic list information)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data terminal access control
  • Data terminal access control
  • Data terminal access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In the following detailed description, a terminal in the form of a portable phone, more preferably a cellular / mobile phone, according to the present invention will be described by way of preferred embodiments. The term terminal as used herein includes all portable / mobile terminals that provide a processor and a user interface. Examples of other terminals falling within the term terminal as used herein are communication devices, PDAs, notebook PCs and desktop PCs.

[0016] Referring now to FIG. 1 , there is disclosed a mobile telephone 1 according to a preferred embodiment of the present invention.

[0017] The mobile phone 1 is of the so-called swivel type, having two housing parts that can be folded about a hinge 23 and swiveled about an axis of rotation 24 . A first housing part 5 containing a battery (not shown) is provided with 3 columns by 4 rows (ITU-T) of an alphanumeric keypad 2 and call handling keys 11 (on and off). The camera switch 21 and the volume switch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal can assume a working and a sharing position. Access to the terminal is controlled in dependence of the position assumed by the terminal. In the working position there is full access. In the sharing position access is limited to allow the proprietor of the terminal to pass the terminal on to other users for sharing content, whilst minimizing the risk of deliberate or accidental access to private and / or confidential data by the other usurers.

Description

technical field [0001] The present invention relates to controlling access to terminals, and more particularly to terminals containing private and / or confidential information and which are used to share non-private or non-confidential information, such as information suitable for sharing. Background technique [0002] Terminals such as PCs, notebooks, desktop PCs and increasingly Personal Digital Assistants (PDAs) and mobile phones are used to share information such as displaying photos, videos, messages, playing video games, and the like. Some data in the terminal is suitable for sharing, but other information such as bank statements, credit card information, certain messages, etc. is private and / or confidential. [0003] Image and video captures can be highly group - include other people in the image / video capture and co-browse content with them. Terminals are carried in a large group environment so there are many planned and unplanned opportunities to share with same or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/16G06F21/30H04W88/02
CPCH04M2250/52G06F2221/2149G06F1/1677H04M1/0241G06F21/30H04M1/0212H04M1/673G06F1/162G06F1/1613
Inventor J·奇普蔡斯R·格里纳尼桥诘贤一
Owner NOKIA CORP