GB2432753A - Handling calls to automatically ensure the privacy of communications with contacts designated secret. - Google Patents

Handling calls to automatically ensure the privacy of communications with contacts designated secret. Download PDF

Info

Publication number
GB2432753A
GB2432753A GB0622158A GB0622158A GB2432753A GB 2432753 A GB2432753 A GB 2432753A GB 0622158 A GB0622158 A GB 0622158A GB 0622158 A GB0622158 A GB 0622158A GB 2432753 A GB2432753 A GB 2432753A
Authority
GB
United Kingdom
Prior art keywords
call handling
handling system
call
private
calls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0622158A
Other versions
GB0622158D0 (en
GB2432753B (en
Inventor
Andre Dominique Clark
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0523983A external-priority patent/GB0523983D0/en
Priority claimed from GB0523984A external-priority patent/GB0523984D0/en
Priority claimed from GB0523982A external-priority patent/GB0523982D0/en
Priority claimed from GB0524904A external-priority patent/GB0524904D0/en
Application filed by Individual filed Critical Individual
Publication of GB0622158D0 publication Critical patent/GB0622158D0/en
Publication of GB2432753A publication Critical patent/GB2432753A/en
Application granted granted Critical
Publication of GB2432753B publication Critical patent/GB2432753B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • H04M19/041Encoding the ringing signal, i.e. providing distinctive or selective ringing capability
    • H04Q7/32
    • H04Q7/3289
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • H04M19/045Call privacy arrangements, e.g. timely inhibiting the ring signal

Abstract

Overriding the normal operating system of a mobile phone to ensure that the sending and receiving of calls and messages to and from some contacts is automatically rendered undetectable in normal use. When a call or message is received the ringing, beeps and flashes are inhibited and the device does not log both the received and sent calls relating to contacts designated secret by the user.

Description

<p>A means of automatically handling calls to and from a mobile electronic
communications device to automatically ensure the privacy of some communications.</p>
<p>The present invention relates to a method of sending and receiving calls and messages to and from an electronic mobile communications device, such as a mobile phone, so that some are automatically kept secret.</p>
<p>Maintaining secrecy of incoming calls, in terms of inhibiting the phone (for example) from ringing, beeping, or flashing, and in terms of barring the device from logging both the receiving and sending of calls, is an issue for people wishing to deal with some of their contacts/clients/calls in an undetectable (stealthy) manner.</p>
<p>An improved means of dealing with confidential calls on interactive electronic communications devices, variously known as mobile phones', or cellular phones', or similar, has now been devised.</p>
<p>According to the present invention, a software programme is provided which is installed on a mobile communications device but is not advertised as being present on the device (that is it does not have an icon in the visible menu of the device).</p>
<p>Once installed the program remains inactive until a call arrives from a source (contact number) designated as a private contact by the authorised user of the communications device when the programme acts to inhibit the device's normal operating system from logging the call, ringing, flashing, or doing whatever it normally does to indicate that an incoming call has been received. Even when it is activated the invention itself remains hidden, so that unauthorised users are totally unaware that a call has been received. The authorised user can find out that such a call has been received only by accessing the invention, with the acceSsing' being restricted to the authorised user only, (by use of some password or Personal Identification Number protection, which given the hidden nature of the software, may require the initial input to come from the user. Such user activated entry being known in the art). The call details and content may thereafter be inspected at a more convenient time and in as private a manner as the authorised user wants. Perhaps when they get home from the office rather than at work.</p>
<p>Different means of hiding and subsequently accessing data so as to maintain its privacy once it has been received and stored by the communications device are well known in the art, being variously known as data safes and secure zones, regarding which no claims are being made here. Rather, the invention described here makes the receiving (and sending) of such information itself a secret, thereby adding another level of security to that which currently exists. This is of particularly benefit when privacy needs to be maintained even in close company, in an office environment for example, or where others have hands-on access to the communication device in question.</p>
<p>The invention can also be used to automatically remove evidence (such as a call-sent log) that a call has been made to the secure contacts too, (with these only recorded within the safe zone of the invention), in order that all communications to and from a private contact are carried out stealthily.</p>
<p>In one embodiment of the invention the relevant data storage area (data safe) wherein the information is ultimately stored may be provided in addition to the invention by another provider, depending on the wishes of the authorised user. In another embodiment the data safe may be physically separate -3-.</p>
<p>from the mobile communication device, in some other device with the link between the two being wireless. In another embodiment the invention may operate from within the linked device with both the secret information contained within a call and the handling of the secret call being done entirely separately in a physical sense, therefore, from the device to which the call is made.</p>
<p>The invention is installed either as software already on a mobile communication device prior to the sale of the device, or may be downloaded or otherwise subsequently installed to run on existing devices.</p>

Claims (1)

  1. <p>Claims: 1. A call handling system whereby a computer programme
    identifies if calls and messages arriving at a mobile electronic communication device are coming from a sender indicated by the user of the device as a secret (private) contact, in which case the programme will not allow the device's normal operating system to indicate that a call is being, or has been, received.</p>
    <p>2. A call handling system whereby a computer programme identifies if outgoing calls or messages from a mobile iS electronic communications device are going to a recipient indicated by the user of the device as a secret (private) contact, in which case the system will ensure that the call is not logged as having been sent by the device's normal operating system.</p>
    <p>3. A call handling system according to any preceding claims wherein calls made to designated secure (private) contacts are logged, or in other ways tracked, only within the secure zone of the invention.</p>
    <p>4. A call handling system according to any preceding claims wherein access to the invention and therefore the call handling information and the data therein, as well as the relevant contact details, is password protected, or protected by a Personal Identification Number requirement, or other secure means.</p>
    <p>5. A call handling system according to any of the preceding claims wherein the storage of the private (secure) information is rendered physically separate from the communications device to which the secure (private) calls are made, by means of a wireless link to another device.</p>
    <p>6. A call handling system according to any of the preceding claims wherein the communication addresses to be treated as secret are input-able by the user.</p>
    <p>7. A call handling system according to any preceding claims, wherein the data being handled by the invention may be of any type usable by the electronic communications device on which the invention is installed.</p>
    <p>8. A call handling system according to any preceding claim, wherein the presence of the invention on a mobile electronic communications device is itself hidden from unauthorised users.</p>
GB0622158A 2005-11-25 2006-11-07 A means of automatically handling calls to and from a mobile electronic communications device to automatically ensure the privacy of some communications Expired - Fee Related GB2432753B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB0523983A GB0523983D0 (en) 2005-11-25 2005-11-25 A means of automatically handling calls to and from a mobile electronic communications device to automatically ensure the privacy of some communications
GB0523984A GB0523984D0 (en) 2005-11-25 2005-11-25 An improved method of hiding data on a mobile electronic communications device such as a mobile phone by means of hiding the display icon
GB0523982A GB0523982D0 (en) 2005-11-25 2005-11-25 An improved method of hiding data on a mobile electronic communications device
GB0524904A GB0524904D0 (en) 2005-12-07 2005-12-07 Keeping secrets on a mobile phone by installing an additional parallel operating system

Publications (3)

Publication Number Publication Date
GB0622158D0 GB0622158D0 (en) 2006-12-20
GB2432753A true GB2432753A (en) 2007-05-30
GB2432753B GB2432753B (en) 2009-08-12

Family

ID=37594464

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0622158A Expired - Fee Related GB2432753B (en) 2005-11-25 2006-11-07 A means of automatically handling calls to and from a mobile electronic communications device to automatically ensure the privacy of some communications

Country Status (1)

Country Link
GB (1) GB2432753B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5550535A (en) * 1992-08-14 1996-08-27 Seiko Communications Holding N.V. Bank balance notification by wristwatch pager
US6148403A (en) * 1997-04-22 2000-11-14 Sharp Kabushiki Kaisha Data receiving with security feature

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5550535A (en) * 1992-08-14 1996-08-27 Seiko Communications Holding N.V. Bank balance notification by wristwatch pager
US6148403A (en) * 1997-04-22 2000-11-14 Sharp Kabushiki Kaisha Data receiving with security feature

Also Published As

Publication number Publication date
GB0622158D0 (en) 2006-12-20
GB2432753B (en) 2009-08-12

Similar Documents

Publication Publication Date Title
US10681552B2 (en) Method for mitigating the unauthorized use of a device
Dagon et al. Mobile phones as computing devices: The viruses are coming!
EP2263185B1 (en) System for monitoring the unauthorized use of a device
EP2266070B1 (en) System for mitigating the unauthorized use of a device
US20130091564A1 (en) Systems and methods for mitigating the unauthorized use of a device
US10462185B2 (en) Policy-managed secure code execution and messaging for computing devices and computing device security
CN102075615A (en) Method for sending and receiving short messages and subscriber identity module (SIM)
CN105592452A (en) Method and apparatus for preventing private data from being read maliciously
CN101754209A (en) Method for protecting contents of mobile phone
CN109063494A (en) A kind of information of mobile terminal security protection system and means of defence
GB2432753A (en) Handling calls to automatically ensure the privacy of communications with contacts designated secret.
Hiremath et al. Cellular network fraud & security, jamming attack and defenses
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
Pandey et al. Bluetooth hacking and its Prevention
KR100610352B1 (en) The method for protecting private information from lost or stolen portable phone and computer readable recording medium thereof
AU2005232137B2 (en) Accessing user interactive electronic communications devices
KR20010044083A (en) Private information protect method for a lost mobile terminal
Harauz et al. A new era of presidential security: The president and his blackberry
WO2014027242A1 (en) Systems and methods for mitigating the unauthorized use of a device
Altalbe Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Wolfe The Insecurity of Mobile Phones
Schafer et al. Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
Mendyk-Krajewska et al. Threats to wireless technologies and mobile devices and company network safety
Porter Privacy and usability in SMS-based G2B/B2G m-Government: STK and SMS: Balancing privacy and usability
Kirk Analyst: Money will fuel mobile spying programs.

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20101107