Unlock instant, AI-driven research and patent intelligence for your innovation.

Security system based on input shortcuts for a computer device

a security system and computer technology, applied in the field of information security, can solve the problems of security password, unscrupulous or other individuals may only require moments, and unauthorized individuals may come to access the device,

Inactive Publication Date: 2013-06-06
MALIKIE INNOVATIONS LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a method for activating security functions on a computer device that is locked and unlocked. The method allows for the device to detect the state it is in and automatically activate the appropriate security function based on a pre-defined security rule. This helps to prevent unauthorized individuals from accessing the device and accessing the secure information stored on it. The technical effect of this method is to provide an improved security feat for computer devices, allowing for more effective protection of sensitive information.

Problems solved by technology

In some instances, an unscrupulous or other unauthorized individual may come to access the device, for example when the device is lost or unattended by the intended user.
A difficulty with this is that the security password would have to be activated by the user, for example by turning on the security password feature or by some triggering event, for example by holstering of a handheld device.
However, the above-described devices require active triggering events to be performed by the user or a passage of a predetermined duration of time.
An unscrupulous or other individual may only require moments to access the secure information, possibly well before any of these security features are activated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system based on input shortcuts for a computer device
  • Security system based on input shortcuts for a computer device
  • Security system based on input shortcuts for a computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]In one aspect, the present application provides a method of activating security functions on a computer device, the computer device having a device state that may be realized by way of a first user input or a second user input. The method includes steps of defining a security rule, wherein the security rule comprises realization of the device state by way of the first user input; designating a security function associated with the security rule; detecting realization of the device state; and if the device state was realized by way of the second user input instead of the first user input, then activating the associated security function.

[0021]In another aspect, the present application provides a computer device. The computer device includes a controller for controlling the operation of the device; a user input interface for inputting information to the controller; a display coupled to the controller; a software module executable by the controller and configured to produce a dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of activating security functions on a computer device, for example a mobile communications device. The computer device includes a device state that may be realized by way of a first user input or a second user input. The method includes designating the first user input to realize the device state as a security rule having an associated security function, detecting realization of the device state, and activating the associated security function if the device state was realized by way of the second user input rather than the first user input. For example, the first user input may be a shortcut input, and the second user input may be a conventional or normal input.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application is a continuation of U.S. patent application Ser. No. 11 / 779,372, filed Jul. 18, 2007. The entire contents of U.S. patent application Ser. No. 11 / 779,372 are hereby incorporated by reference.FIELD[0002]Example embodiments described herein relate to computer devices and, in particular, to security of information on such devices.BACKGROUND[0003]Computer devices, in particular handheld mobile communications devices, typically contain personal, corporate, or other secure information of the user. Such computer devices allow a user to store and manipulate such information as needed. If the computer device acts as a communications device, such devices would allow a user to be in contact through a communications network, for example the Internet, through various applications such as email and web browsing.[0004]In some instances, an unscrupulous or other unauthorized individual may come to access the device, for example when the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/55
CPCG06F21/55G06F21/31
Inventor MARTIN, DARYL JOSEPHHASSAN, AHMED E.WILSON, JOHN FERGUSON
Owner MALIKIE INNOVATIONS LTD