Systems and methods that provide user and/or network personal data disabling commands for mobile devices

a mobile device and network technology, applied in the field of mobile devices, can solve the problems of loss of money, damage to the device owner, and inability to obtain credit, so as to mitigate any damage (e.g., financial) suffered

Inactive Publication Date: 2005-08-25
NOKIA CORP
View PDF8 Cites 451 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009] The present invention relates to systems and methods utilized to prevent unauthorized access to information stored in a mobile device such as a cellular phone, personal data assistant or handheld computer, for example. Such stored data can contain personal and/or highly sensitive data such as social security numbers, ba

Problems solved by technology

Thus, the information contained in an individual's mobile device can be extremely user specific and as a result contain highly sensitive information related to the device owner.
As a consequence, an unscrupulous user who finds a lost or misplaced mobile device can misuse the information stored therein.
For example, a mobile device can contain information that is user-specific but not readily usable unless such data can be correlated with other information.
Such data can be tied to the original user providing an easy means for the unscrupulous user to commit identity theft, which can result in loss of money, ability to obtain credit and other damaging affects to a device owner.
Such a misuse of information can be a major inconvenience to the device owner and thus is undesirable.
By the nature of their design, mobile devices have several properties making them more vulnerable to loss.
Since the information in the devices can be highly sensitive, there exists a danger that someone who acquires the lost device will have access to all the information contained within.
In the hands of an unscrupulous user, this in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods that provide user and/or network personal data disabling commands for mobile devices
  • Systems and methods that provide user and/or network personal data disabling commands for mobile devices
  • Systems and methods that provide user and/or network personal data disabling commands for mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention relates to systems and methods that selectively disable mobile device (e.g., cell phone, PDA, handheld PC, laptop computer, etc.) functionality to prohibit access to portions of information stored therein and / or in connection therewith. Such information can be user specific, for example, highly sensitive and / or personal data such as bank account numbers, social security numbers, credit card numbers, addresses and the like. Thus, the present invention can disable access to the device to prevent unauthorized access to data stored in device memory. It is to be appreciated that the present invention can be employed in relation to any number of systems and / or environments to inhibit the functionality as desired by the user. In addition, the subject invention can limit the functionality of such a system in a plurality of ways including disabling the display, disabling any peripheral input devices to the target system and disabling specific functionality (e.g.,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile devices can be utilized to store personal and/or highly sensitive information such as bank account numbers, social security numbers, credit card numbers and the like. If the mobile device is lost or stolen, data stored within the device can be accessed by an unauthorized user; and, thus, any personal and/or highly sensitive information can be obtained. In order to mitigate unauthorized access, the subject invention provides a disabling component that communicates with the lost or stolen device to render data stored thereon inaccessible. Further, the data can be stored in local or remote locations to backup stored information, thereby creating a more robust and reliable method of storing information important to the device owner. These features provide enhancements over conventional mobile device security techniques.

Description

TECHNICAL FIELD [0001] The present invention generally relates to mobile devices, and more particularly to systems and methods that employ various mechanisms that selectively disable mobile device functionality to prohibit unauthorized access to information stored within mobile device memory. BACKGROUND OF THE INVENTION [0002] In today's world, the use of mobile devices (e.g., cellular phones, personal digital assistants, handheld PCs, etc.) has become a standard form of maintaining communication with others as well as a means to store data important to the user. The information stored on such devices can relate to personal or business data such as social security numbers, phone numbers, addresses, bank account numbers, credit card numbers, etc. Due to technological advances in memory storage capabilities proportional to memory size, a mobile device is capable of storing large amounts of information. [0003] Thus, the information contained in an individual's mobile device can be extr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14H04M1/67H04M1/72463H04M3/00H04W8/22
CPCH04W8/22H04M1/67H04W12/08H04M1/72463H04M1/724631
Inventor KENNEY, TOM
Owner NOKIA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products