GB2432753A - Handling calls to automatically ensure the privacy of communications with contacts designated secret. - Google Patents
Handling calls to automatically ensure the privacy of communications with contacts designated secret. Download PDFInfo
- Publication number
- GB2432753A GB2432753A GB0622158A GB0622158A GB2432753A GB 2432753 A GB2432753 A GB 2432753A GB 0622158 A GB0622158 A GB 0622158A GB 0622158 A GB0622158 A GB 0622158A GB 2432753 A GB2432753 A GB 2432753A
- Authority
- GB
- United Kingdom
- Prior art keywords
- call handling
- handling system
- call
- private
- calls
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/68—Circuit arrangements for preventing eavesdropping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M19/00—Current supply arrangements for telephone systems
- H04M19/02—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
- H04M19/04—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M19/00—Current supply arrangements for telephone systems
- H04M19/02—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
- H04M19/04—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
- H04M19/041—Encoding the ringing signal, i.e. providing distinctive or selective ringing capability
-
- H04Q7/32—
-
- H04Q7/3289—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M19/00—Current supply arrangements for telephone systems
- H04M19/02—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
- H04M19/04—Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
- H04M19/045—Call privacy arrangements, e.g. timely inhibiting the ring signal
Abstract
Overriding the normal operating system of a mobile phone to ensure that the sending and receiving of calls and messages to and from some contacts is automatically rendered undetectable in normal use. When a call or message is received the ringing, beeps and flashes are inhibited and the device does not log both the received and sent calls relating to contacts designated secret by the user.
Description
<p>A means of automatically handling calls to and from a mobile electronic
communications device to automatically ensure the privacy of some communications.</p>
<p>The present invention relates to a method of sending and receiving calls and messages to and from an electronic mobile communications device, such as a mobile phone, so that some are automatically kept secret.</p>
<p>Maintaining secrecy of incoming calls, in terms of inhibiting the phone (for example) from ringing, beeping, or flashing, and in terms of barring the device from logging both the receiving and sending of calls, is an issue for people wishing to deal with some of their contacts/clients/calls in an undetectable (stealthy) manner.</p>
<p>An improved means of dealing with confidential calls on interactive electronic communications devices, variously known as mobile phones', or cellular phones', or similar, has now been devised.</p>
<p>According to the present invention, a software programme is provided which is installed on a mobile communications device but is not advertised as being present on the device (that is it does not have an icon in the visible menu of the device).</p>
<p>Once installed the program remains inactive until a call arrives from a source (contact number) designated as a private contact by the authorised user of the communications device when the programme acts to inhibit the device's normal operating system from logging the call, ringing, flashing, or doing whatever it normally does to indicate that an incoming call has been received. Even when it is activated the invention itself remains hidden, so that unauthorised users are totally unaware that a call has been received. The authorised user can find out that such a call has been received only by accessing the invention, with the acceSsing' being restricted to the authorised user only, (by use of some password or Personal Identification Number protection, which given the hidden nature of the software, may require the initial input to come from the user. Such user activated entry being known in the art). The call details and content may thereafter be inspected at a more convenient time and in as private a manner as the authorised user wants. Perhaps when they get home from the office rather than at work.</p>
<p>Different means of hiding and subsequently accessing data so as to maintain its privacy once it has been received and stored by the communications device are well known in the art, being variously known as data safes and secure zones, regarding which no claims are being made here. Rather, the invention described here makes the receiving (and sending) of such information itself a secret, thereby adding another level of security to that which currently exists. This is of particularly benefit when privacy needs to be maintained even in close company, in an office environment for example, or where others have hands-on access to the communication device in question.</p>
<p>The invention can also be used to automatically remove evidence (such as a call-sent log) that a call has been made to the secure contacts too, (with these only recorded within the safe zone of the invention), in order that all communications to and from a private contact are carried out stealthily.</p>
<p>In one embodiment of the invention the relevant data storage area (data safe) wherein the information is ultimately stored may be provided in addition to the invention by another provider, depending on the wishes of the authorised user. In another embodiment the data safe may be physically separate -3-.</p>
<p>from the mobile communication device, in some other device with the link between the two being wireless. In another embodiment the invention may operate from within the linked device with both the secret information contained within a call and the handling of the secret call being done entirely separately in a physical sense, therefore, from the device to which the call is made.</p>
<p>The invention is installed either as software already on a mobile communication device prior to the sale of the device, or may be downloaded or otherwise subsequently installed to run on existing devices.</p>
Claims (1)
- <p>Claims: 1. A call handling system whereby a computer programmeidentifies if calls and messages arriving at a mobile electronic communication device are coming from a sender indicated by the user of the device as a secret (private) contact, in which case the programme will not allow the device's normal operating system to indicate that a call is being, or has been, received.</p><p>2. A call handling system whereby a computer programme identifies if outgoing calls or messages from a mobile iS electronic communications device are going to a recipient indicated by the user of the device as a secret (private) contact, in which case the system will ensure that the call is not logged as having been sent by the device's normal operating system.</p><p>3. A call handling system according to any preceding claims wherein calls made to designated secure (private) contacts are logged, or in other ways tracked, only within the secure zone of the invention.</p><p>4. A call handling system according to any preceding claims wherein access to the invention and therefore the call handling information and the data therein, as well as the relevant contact details, is password protected, or protected by a Personal Identification Number requirement, or other secure means.</p><p>5. A call handling system according to any of the preceding claims wherein the storage of the private (secure) information is rendered physically separate from the communications device to which the secure (private) calls are made, by means of a wireless link to another device.</p><p>6. A call handling system according to any of the preceding claims wherein the communication addresses to be treated as secret are input-able by the user.</p><p>7. A call handling system according to any preceding claims, wherein the data being handled by the invention may be of any type usable by the electronic communications device on which the invention is installed.</p><p>8. A call handling system according to any preceding claim, wherein the presence of the invention on a mobile electronic communications device is itself hidden from unauthorised users.</p>
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0523983A GB0523983D0 (en) | 2005-11-25 | 2005-11-25 | A means of automatically handling calls to and from a mobile electronic communications device to automatically ensure the privacy of some communications |
GB0523984A GB0523984D0 (en) | 2005-11-25 | 2005-11-25 | An improved method of hiding data on a mobile electronic communications device such as a mobile phone by means of hiding the display icon |
GB0523982A GB0523982D0 (en) | 2005-11-25 | 2005-11-25 | An improved method of hiding data on a mobile electronic communications device |
GB0524904A GB0524904D0 (en) | 2005-12-07 | 2005-12-07 | Keeping secrets on a mobile phone by installing an additional parallel operating system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0622158D0 GB0622158D0 (en) | 2006-12-20 |
GB2432753A true GB2432753A (en) | 2007-05-30 |
GB2432753B GB2432753B (en) | 2009-08-12 |
Family
ID=37594464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0622158A Expired - Fee Related GB2432753B (en) | 2005-11-25 | 2006-11-07 | A means of automatically handling calls to and from a mobile electronic communications device to automatically ensure the privacy of some communications |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2432753B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5550535A (en) * | 1992-08-14 | 1996-08-27 | Seiko Communications Holding N.V. | Bank balance notification by wristwatch pager |
US6148403A (en) * | 1997-04-22 | 2000-11-14 | Sharp Kabushiki Kaisha | Data receiving with security feature |
-
2006
- 2006-11-07 GB GB0622158A patent/GB2432753B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5550535A (en) * | 1992-08-14 | 1996-08-27 | Seiko Communications Holding N.V. | Bank balance notification by wristwatch pager |
US6148403A (en) * | 1997-04-22 | 2000-11-14 | Sharp Kabushiki Kaisha | Data receiving with security feature |
Also Published As
Publication number | Publication date |
---|---|
GB0622158D0 (en) | 2006-12-20 |
GB2432753B (en) | 2009-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681552B2 (en) | Method for mitigating the unauthorized use of a device | |
Dagon et al. | Mobile phones as computing devices: The viruses are coming! | |
EP2263185B1 (en) | System for monitoring the unauthorized use of a device | |
EP2266070B1 (en) | System for mitigating the unauthorized use of a device | |
US20130091564A1 (en) | Systems and methods for mitigating the unauthorized use of a device | |
US10462185B2 (en) | Policy-managed secure code execution and messaging for computing devices and computing device security | |
CN102075615A (en) | Method for sending and receiving short messages and subscriber identity module (SIM) | |
CN105592452A (en) | Method and apparatus for preventing private data from being read maliciously | |
CN101754209A (en) | Method for protecting contents of mobile phone | |
CN109063494A (en) | A kind of information of mobile terminal security protection system and means of defence | |
GB2432753A (en) | Handling calls to automatically ensure the privacy of communications with contacts designated secret. | |
Hiremath et al. | Cellular network fraud & security, jamming attack and defenses | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
Pandey et al. | Bluetooth hacking and its Prevention | |
KR100610352B1 (en) | The method for protecting private information from lost or stolen portable phone and computer readable recording medium thereof | |
AU2005232137B2 (en) | Accessing user interactive electronic communications devices | |
KR20010044083A (en) | Private information protect method for a lost mobile terminal | |
Harauz et al. | A new era of presidential security: The president and his blackberry | |
WO2014027242A1 (en) | Systems and methods for mitigating the unauthorized use of a device | |
Altalbe | Do New Mobile Devices in Enterprises Pose A Serious Security Threat? | |
Wolfe | The Insecurity of Mobile Phones | |
Schafer et al. | Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage? | |
Mendyk-Krajewska et al. | Threats to wireless technologies and mobile devices and company network safety | |
Porter | Privacy and usability in SMS-based G2B/B2G m-Government: STK and SMS: Balancing privacy and usability | |
Kirk | Analyst: Money will fuel mobile spying programs. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20101107 |