GB2525233A - Controlling user access in a mobile device - Google Patents
Controlling user access in a mobile device Download PDFInfo
- Publication number
- GB2525233A GB2525233A GB1406932.2A GB201406932A GB2525233A GB 2525233 A GB2525233 A GB 2525233A GB 201406932 A GB201406932 A GB 201406932A GB 2525233 A GB2525233 A GB 2525233A
- Authority
- GB
- United Kingdom
- Prior art keywords
- permission
- controller
- data
- operable
- payment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Storage Device Security (AREA)
Abstract
The permission controller (PCU) 21 is provided by a hardware component functionally separate from the CPU in a portable electronic device (fig. 2), such as a mobile phone or tablet computer. The PCU allows user access to functions, such as storage, wireless communication, audio or data input / output in whole or part, based on encrypted permission data received from an external central server (4, fig. 3). The permission data may be generated from user data sent to the server. Preferably, the PCU controls supply of power from a battery or transformer, to the functional units of the device, independently of any function of the CPU. Access to a devices functions can be restricted if bad debt is incurred in connection with a hire-purchase (rent-to-own) device. The operating systems of such devices are often easy to alter (to root or jailbreak) in comparison with software/ middleware/ firmware embedded in the device itself, which might be used in larger consumer devices such as televisions.
Description
CONTROLLING USER ACCESS IN A MOBILE DEVICE
The present invention relates to a controlling user access in a mobile device.
BACKGROUND OF THE INVENTION
Renting or renting with an option to own (known as hire purchase or rent-to-own in some parts of the world) high price products can be the only way that many lower income and credit-constrained households around the world can obtain products that they need or desire. Typically, rental companies and companies that provide specialist credit and hire purchase facilities to consumers to obtain products have many disjointed systems, some automated, some not to manage their customer repayments. A risk associated with renting products is the potential bad debts that companies will experience due to the write off of goods as a result of people absconding or refusing to pay for the goods.
GB2498763 describes a system, method and device for controlling access to large consumer devices, such as televisions. In such a system, the consumer device includes a permission control unit (PCU), which resides in software embedded within the firmware of the device being controlled. The nature of large consumer devices is such that the firmware, which can operate at a device level for the hardware and in a middleware layer for operation of other functionality, is not readily accessible and upgradeable to by the consumer. In fact, it is possible to prevent upgrades to the firmware from any server other than an approved server, using secure encryption and authentication techniques.
Such approaches are difficult to implement on a mobile phone or tablet device because the operating systems are generally relatively straightforward to alter (to "root" or "jailbreak").
Accordingly, it is desirable to provide a portable electronic device which enables the control of user access to functions of that device, in a manner that is not easily avoided.
SUMMARY OF THE PRESENT INVENTION
According to an example, there is provided a secure hardware and software platform to limit the risk of bad debts relating to rented portable electronic equipment by providing companies the means to control the payment behavior of their customers using a real time pay as you use system. The system allows a customer access to the device in question assuming that payments have been made, can track the device if a customer absconds with the device and can limit the functions of the device in situations where a customer is unable to make a full payment or when the customer's payment falls into arrears but they make an acceptable commitment to pay.
A platform according to an example provides an end-to-end solution between a portable electronic device, a payment system used to collect payment from the customer and a control system used to manage device permissions. The control system is able to unlock, limit or lock the product in question or put a trace on the product should the customer abscond with the product, for
example.
According to one aspect of the present invention, there is provided a portable electronic device comprising a central processing unit, a plurality of functional units, and a permission controller provided by a hardware component functionally separate from the central processing unit and operable to control user access to functions of the device provided by the functional units, such control being in dependence upon encrypted permission data received from a central server external to the device.
For example, the central processing unit and permission controller are provided by respective integrated circuits.
In one example, the permission controller is operable to restrict user access to one or more functions of the device in dependence upon such received permission data.
In another example, the permission controller is operable to restrict user access to one or more functions of the device in the absence of receipt of such permission data.
In an example, the central processing unit is operable to transfer user data with the central server external to the device, and said permission data being generated from such user data.
An example of such a device comprises an electrical power supply, wherein the permission controller is operable to control supply of electrical power to the functional units of the device, such control being in dependence upon such received permission data, and being independent of any function of the central processing unit. The electrical power supply may be a battery and/or electrical transformer.
The plurality of functional units may include a display screen, a user input device, an audio input and output device, a data input and output device, a data storage device, and/or a wireless telecommunication device.
The permission controller may be operable to restrict access to preselected pads of particular functions of the device.
The permission controller may be further operable to compare contents of a data storage area associated with the central processing unit with expected contents thereof, and to exert such control to the functions of the device in dependence upon the result of such comparison in combination with such received permission data.
BRIEF DESCRIPTION OF THE DRAWINGS
An embodiment of the invention will now be described, by way of example only, and with reference to the accompanying drawings, in which: Figure 1 is a schematic block diagram of a system according to an example; Figure 2 is a schematic block diagram of a device according to an example; and Figure 3 is a schematic block diagram of a system according to an example.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
A system embodying one aspect of the present invention for use with a portable electronic device is illustrated in overview in Figure 1. The system 1 includes portable device hardware 2, portable device software 3 and a central server 4.
The hardware 2 includes a permission controller 21, the software 3 includes a permission control module 31, and the server 4 incudes a central controller 41.
The module 31 operates to control the hardware 21 via internal communications links 5. The module 31 communicates with the central controller 41 of the server 4 via an Internet connection 6, such as that provided by the portable device being controlled.
The system 1 of Figure 1 thereby provides a permission control system for a portable electronic device, which system resides in the permission control module 31 and in the permission controller 21. The portable electronic device will only function properly if the permission controller 21 is able to detect that specific elements of the permission control module 31 are functioning as intended.
This gives two levels of permission control security. Firstly, the module 31 controls access to the device device such that the customer must first interact with the central server 4, through a user interface, either to pay or to make a promise to pay. Secondly, in the event that the consumer hacks the module 31, or replaces the device's operating system entirely, then the permission controller 21 operates to intervene to prevent or restrict access to the portable device.
Figure 2 illustrates one example of the device hardware 2 of Figure 1 in more detail. The hardware 2 includes the permission controller 21 as described. The hardware 2 also includes a power button 22, a power controller 23, a battery 24, a communications device 25 (such as a modem), a main device processor 26, and other components 27 (such as a display screen, microphone, loudspeaker, camera or storage device). In overview, the permission controller 21 is operable to control supply of power from the battery 24 to the other components of the device. In the example shown in Figure 2, the battery is able to supply power to the modem 25 directly so that communications can be maintained with the central controller 41 of the server 4. The permission controller 21 receives control information from the power button 21, and from the main device processor 26, and operates to control the power controller 23.
The power controller 23 is operable to switch the power on and off to the various components of the device. For example, the power controller 23 may be instructed by the permission controller to prevent power being supplied to the display screen, storage device, or camera of the device.
The permission controller 21 also interfaces with the permission control module 31 of the device software 3. The permission controller 21 receives codes from the permission control module 31 that it can decrypt, authenticate, interpret and action accordingly. Multiple codes can be sent at once for the permission controller 21 to action.
The permission control module 31 itself will not have access to the originating algorithms for the transmitted control codes, it will simply pass the code given it by the central server 4, (whether via an Internet connection or a manually entered encrypted key entered by the consumer if there is no Internet connection) straight through to the permission controller 21.
The codes will be encrypted on the central server 4 using a public and private key, so the permission controller 21 will only action codes that have been sent to it by the central server 4.
The part of the encryption algorithm will rely on unique ID codes specific to the device/customer and date and time calculations; these codes will only be valid for a configurable period of time. This means that the permission controller 21 has access to a date and time clock.
It may be possible to use a date and time clock of the portable device but a clock dedicated to the permission controller 21 that can be synchronised to the central server 4 using an encrypted code designed to keep both clocks in sync This approach means that only the permission controller 21, having firmware that is not accessible outside of the system, and the central server 4 will be the only two systems that have access to the software that develops the codes and then interprets them on the device.
The codes received by the permission controller 21 are then processed and from this the device will either run unrestricted or the permission controller 21 will apply restrictions by preventing power reaching some or all components.
Restrictions applied by the permission controller 21 may be delayed or timed on start-up on the device. This might be to allow the consumer to unlock a device by returning it to an approved state.
A more complex example of the permission controller 21 is able to interrogate the memory of the device that holds the device operating system, which itself incorporates the permission control module 31 elements. In that case, the permission controller 21 will be able calculate a checksum against the binary codes that make up the device's approved operating system. If the checksum does not validate against the checksum that the permission controller 21 is expecting, then the permission controller 21 will apply restrictions The central server 4 would need to be able to provide the permission controller 21 with encrypted checksums that are valid and the permission controller 21 would need to be able to store a list of acceptable checksums that it can validate against. This could be stored in onboard memory within the permission controller 21, but it is possible that it could use external memory elsewhere within the device that is only available to the permission controller 21.
Allowing the server 4 to provide multiple valid checksums enables there to be more than one version of permission control module 31 to be valid at the same time on a single device.
Even when the permission controller 21 has restricted user access to components on the device, it is necessary for the permission controller 21 to receive a code from central server 4, via the permission control module 31 to alter its state. Therefore the permission controller 21 will periodically allow the device to boot in order to receive and process instructions. This may be achieved by allowing the device to be operable for a predefined amount of time.
If in this time no new codes are received then the permission controller 21 will restrict functionality of the device again.
Figure 3 illustrates functional elements of the system of Figure in more detail.
The device software 3 includes the permission control module 31 described above, and also includes a payment module 32, a promise-to-pay module 33, and a restrictions module 34. Each of these modules 32, 33 and 34 provide the permission control module with specific functions.
The central server 4 includes the central controller 41, and also includes a customer payment module 42, an arrears management module 43 and a customer records module 44.
A payment gateway 7, which includes a payment approval module 71, may be provided as part of the system, or may be provided by a third party system.
The permission control module 31 interfaces with the central controller 41 using a suitable communications method. Specific operations will be described below, but, in general terms, the permission control module operates to provide the permission controller 21 of the hardware 2 with suitable control inputs. The control module 31 controls the payment module 32 in order to collect and process payments through the payment gateway directly from the device itself A payment record is then sent from the gateway 7 to the central controller 41, via the customer payments module 42, for processing. The payment record is stored in the customer records module 44. If the payment record indicates that a successful payment has been made, then the central controller 41 instructs the permission control module of the device accordingly.
The arrears management module 43 operates to provide the central controller 41 and hence the permission control module 31 with information regarding any arrears for the customer concerned.
The promise-to-pay module 33 operates to determine form the customer when an appropriate payment schedule has been put in place, and provides the permission control module with appropriate information.
The restrictions controller 34 operates to control access to the functions and components of the device in dependence upon control information provided by the permission control module 31. The module 31 restricts access to the various functions of the device, including but no limited to such elements as access to apps, Internet] music and non-emergency phone functions. The permission control module 31 also serves to provide an interface between the customer and the central server 4.
Access may be denied temporarily until the customer carries out an action required to regain access. The types of actions will include: 1) Making a full payment for arrears outstanding 2) Making a part payment for arrears outstanding and providing a promise to pay date 3) Making no payment but providing a promise to pay date 4) Making a new arranged payment schedule that will replace the contractual repayment schedule for a period of X weeks/months To aid the efficient handling of these interactions with customers the permission control module 31 allows the customer to carry out these actions using the device, making use of the payment control module 32 and the promise-to-pay module 33. This saves significant amount of human systems and time in trying to contact customers to make these arrangements. The permission control module 31 is able to restrict access to the functions of the device until the customer opts for one of the self-serve options to unlock the device.
This leaves the customer service able to focus on the more complex customer situations. Typically action 4 above would be carried out via a conversation with a member of staff, however it is possible that more simple arranged payment schedules might be offered certain customers as a simple button on the device to press. For example, a simple arranged payment schedule to pay an extra £2 for 4 installments could be offered as a one-click option for the customer to accept without having to speak to a member of staff.
The permission control module 31 is in regular contact with the central controller 41 in order to receive both instructions for the permission control module 31 to carry out and encrypted codes for the permission controller 21 to decrypt and process.
Several examples of how the system described above works in different scenarios will now be described.
Case 1 -Customer makes payments on time and is not in arrears with their repayments The device connects to the central server 4 at predefined intervals; a permission file is downloaded from the central server 4. The permission file contains instructions for the permission control module telling the permission control module 31 to allow device to run unrestricted until a future date or time.
It may also contain configuration parameters for the permission control module 31 to apply that effects the way the permission control module 31 functions.
The file also contains an encrypted code that the permission control module 31 will pass to the permission controller 21. The permission control module 31 will simply pass this code untouched to the permission controller 21.
The permission controller 21 will decrypt and interpret the code, which in this use case will be proceed without any restrictions.
The permission controller 21 will also synchronise its date and time clock/counter with the central server 4 from one of the codes received.
Case 2 -Customer is in arrears but on an agreed repayment plan and they make these agreed payments on time In this example, the customer has fallen behind with their repayments but is keeping to an agreed payment schedule designed to get them out of arrears.
The central server 4, in this case, acts in accordance with Case 1 above but with the addition that the permission file may include instructions for the permission control module 31 to apply partial restrictions on the use of the device.
Partial restrictions may take the form of removing access to some of the features of the device, for example the camera or access to some or all apps etc..
Case 3 -Customer fails to make a payment In this case when the permission control module 31 next connects to the central server 4 the permission file received will tell the permission control module 31 to restrict access to the device and force the consumer to interact with the central server 4 to make a full payment to unlock the device, make a partial payment and a promise to pay the rest by a certain date or make a promise to pay the full amount at a later point in time.
The central server 4 will determine the exact parameters around what is an acceptable payment or promise to pay for a specific customer.
The permission control module 31 will restrict access to the device until they have carried out one of the permissible actions described above. At which point the device will reconnect with the central server and receive a new permission file that with have either all restrictions lifted or, in the case of partial payment and promise to pay, only have partial restrictions lifted.
Case 4 -Customer replaces the device software/operating system with an unapproved standard version In its simplest configuration the permission controller 21 will cease to receive periodic codes from the permission control module 31 (since that module will not be included in the newly loaded software) and will apply restrictions based on criteria coded into the permission controller 21. The permission controller 21 will remain in restricted mode until a correctly approved version of the operating system, containing the permission control module 31, is reinstalled on the device and it receives a valid code from the permission control module 31.
Case S -Customer hacks the device software in order to bypass the permission control functionality In order to maintain unrestricted access to the device, any hacker would need to be able to send acceptable codes to the permission controller 21 to fool it into accepting instructions to keep device unrestricted. Without knowing how the codes are encrypted and what the codes actually do, it would be almost impossible to do this on a trial and error basis.
If the permission controller 21 receives codes that it does not recognise it will go into restricted mode after a number of failed attempts.
As an extra security measure, the permission controller 21, in a more complex configuration, will run a checksum validation over the memory of the decice in which the device software resides. This checksum is compared with allowable checksums. If unapproved changes to the device software have been made, the device will fail this test and the permission controller 21 will go into restricted mode. This test would be run at startup and periodically to validate that the correct device software is in operation.
Case 6 -Customer tries to pass spoof codes to the permission controller 21 Only the central server 4 will be able to compile and encrypt a code for the permission controller 21 to decrypt and action.
The code however has to be passed to the permission controller 21 by the permission control module 31. This means that a hacker might try pushing data to the permission controller 21 to attempt to find a sequence of data bytes that might effect the operation of the permission controller 21.
In this instance the permission controller 21 will automatically drop into one of a number of lockdown states if a configurable number of failed attempts are made and remain in that state until it receives a valid code to unlock the device.
Case 7 -The customer's payments are paid on time and they are not on an arranged payment schedule If a customer's payment is received on time, then the permission control module 31 will allow full access to the device and all its features Case 8 -The customer's payment is missed and they opt to pay in full by card If the customer misses a payment, the permission control module 31 is instructed by central server 4 to restrict access to the device. The customer may then select the option to make a card payment.
They can select to do this on the device itself, which will then connect, via the payment controller 32, to the payment gateway 7 to conclude a transaction.
Alternatively, the customer can make the payment using a different device and make a payment through a payment page provided.
Once the central server 4 receives confirmation from the payment gateway 7 that a full transaction has been processed, the permission control module 31 is instructed to unlock the device.
Case 9 -The customer's payment is missed and they opt to pay in full using an alternative payment method If the customer misses a payment and choose to make a full payment at a store or other location, then the central server 4 instructs the permission control module 31 to unlock the device for a grace period of X minutes, to allow the customer time to go and make the payment using the chosen payment method, such as by telephone, or in person using a service such as PayPointTM.
If the customer does not pay within that grace period the device will be locked again and the customer may not receive any further grace period during the current period of being in arrears.
Case 10-The customer's payment is missed and they opt to make a partial payment If the device is locked down and the customer elects to make a partial payment then the permission control module 31 processes the payment using the payment module 32. The central server 4 receives information that a partial payment has been made, and then provides the permission control module 31 with a range of acceptable promise-to-pay dates for the customer to choose from.
The permission control module 31 will offer the customer a range of acceptable dates to choose when the balance of the payment will be made. Once selected the date will be passed to the central server 4, which will in turn establish which restrictions should be lifted and send the permission control module 31 instructions to fully or partially lift certain restrictions.
Case 11 -The customer's payment is missed and they opt to promise to pay at a later date If the customer cannot pay they might be offered an option to make a promise to pay. The central server 4 determines, by using customer behavioral algorithms, exactly what time period a customer will be offered when it comes to making a promise to pay. For some customers, they may only have an hour or two to make a payment, for others it could be a number of weeks.
In its simplest form the permission control module 31 displays a range of dates that the central server 4 calculate for the customer and the customer selects the most appropriate date. This date is passed back to the central server 4 and the restrictions are lifted accordingly. It is important to note restriction may only partially be lifted, the exact restrictions will be determined by the customer and how far in the future the promise to pay date is set for.
In a more complex form the date of payment and amount of payment are captured by the permission control module 31 and passed to the central server 4. If the amount of payment is less than the required amount the central server 4 may make suggestions for an arranged payment schedule and instruct the permission control module 31 to offer these suggestions to the customer. If the customer accepts the terms of this new temporary arranged payment schedule the central server 4 will instruct the permission control module 31 to remove some or all of the restrictions.
Claims (9)
- CLAIMS: 1. A portable electronic device comprising a central processing unit, a plurality of functional units, and a permission controller provided by a hardware component functionally separate from the central processing unit and operable to control user access to functions of the device provided by the functional units, such control being in dependence upon encrypted permission data received from a central server external to the device.
- 2. A device as claimed in claim 1, wherein the central processing unit and permission controller are provided by respective integrated circuits.
- 3. A device as claimed in claim 1 or 2, wherein the permission controller is operable to restrict user access to one or more functions of the device in dependence upon such received permission data.
- 4. A device as claimed in any one of the preceding claims, wherein the permission controller is operable to restrict user access to one or more functions of the device in the absence of receipt of such permission data.
- 5. A device as claimed in any one of the preceding claims, wherein the central processing unit is operable to transfer user data with the central server external to the device, and said permission data being generated from such user data.
- 6. A device as claimed in any one of the preceding claims, further comprising an electrical power supply, wherein the permission controller is operable to control supply of electrical power to the functional units of the device, such control being in dependence upon such received permission data, and being independent of any function of the central processing unit.
- 7. A device as claimed in claim 6, wherein the electrical power supply is a battery and/or electrical transformer.
- 8. A device as claimed in any one of the preceding claims, wherein the plurality of functional units include a display screen, a user input device, an audio input and output device, a data input and output device, a data storage device, and/or a wireless telecommunication device.
- 9. A device as claimed in any one of the preceding claims, wherein the permission controller is operable to restrict access to preselected pads of particular functions of the device.1O.A device as claimed in any one of the preceding claims, wherein the permission controller is further operable to compare contents of a data storage area associated with the central processing unit with expected contents thereof, and to exert such control to the functions of the device in dependence upon the result of such comparison in combination with such received permission data.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1406932.2A GB2525233A (en) | 2014-04-17 | 2014-04-17 | Controlling user access in a mobile device |
PCT/GB2015/051018 WO2015159048A1 (en) | 2014-04-17 | 2015-04-01 | Controlling user access in a mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1406932.2A GB2525233A (en) | 2014-04-17 | 2014-04-17 | Controlling user access in a mobile device |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201406932D0 GB201406932D0 (en) | 2014-06-04 |
GB2525233A true GB2525233A (en) | 2015-10-21 |
Family
ID=50928914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406932.2A Withdrawn GB2525233A (en) | 2014-04-17 | 2014-04-17 | Controlling user access in a mobile device |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2525233A (en) |
WO (1) | WO2015159048A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021033460A (en) * | 2019-08-20 | 2021-03-01 | 株式会社メルカリ | Information processing method, information processing device, and program |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070296998A1 (en) * | 2006-06-23 | 2007-12-27 | Sharp Kabushiki Kaisha | Image processing apparatus |
GB2498763A (en) * | 2012-01-27 | 2013-07-31 | Dunraven Finance Ltd | Control system for rental device for restricting / disabling device. |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080147555A1 (en) * | 2006-12-18 | 2008-06-19 | Daryl Carvis Cromer | System and Method for Using a Hypervisor to Control Access to a Rental Computer |
-
2014
- 2014-04-17 GB GB1406932.2A patent/GB2525233A/en not_active Withdrawn
-
2015
- 2015-04-01 WO PCT/GB2015/051018 patent/WO2015159048A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070296998A1 (en) * | 2006-06-23 | 2007-12-27 | Sharp Kabushiki Kaisha | Image processing apparatus |
GB2498763A (en) * | 2012-01-27 | 2013-07-31 | Dunraven Finance Ltd | Control system for rental device for restricting / disabling device. |
Also Published As
Publication number | Publication date |
---|---|
WO2015159048A1 (en) | 2015-10-22 |
GB201406932D0 (en) | 2014-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105488679B (en) | Mobile payment device, method and apparatus based on biological identification technology | |
FI125071B (en) | Payment system | |
US9324108B2 (en) | Control method, system and device | |
US10311436B2 (en) | User authentication method and device for credentials back-up service to mobile devices | |
CN105518732A (en) | Authorizing transactions using mobile device based rules | |
JP2005285054A (en) | Communication terminal device | |
CN106663174A (en) | Restricting system calls using protected storage | |
US12041645B2 (en) | Systems, methods and devices for ATM access during outages | |
CN109087091A (en) | A kind of account trading security system and method | |
KR102078566B1 (en) | Method and system of preventing loss of a cryptocurrency | |
WO2019244648A1 (en) | Information processing device, information processing method, and program | |
US20170085649A1 (en) | Method and System for Remote Management of Access to Appliances | |
WO2015159048A1 (en) | Controlling user access in a mobile device | |
CN104270650B (en) | The safety control system and method for a kind of internet television | |
US9348983B2 (en) | Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services | |
GB2525234A (en) | Controlling user access in a mobile device | |
JP2009043271A (en) | Service providing system, terminal device, and program | |
CN108229776A (en) | One kind is arranged an order according to class and grade method of adjustment and device | |
US10021565B2 (en) | Integrated full and partial shutdown application programming interface | |
CN101414333B (en) | Time safety transfer apparatus and time update method for transfer system | |
CN117098136A (en) | Equipment protection method and related device | |
CN108985762A (en) | A kind of Account Registration and transaction security method and system | |
CN107578553A (en) | Method based on program and management equipment management of leasing control head-mounted display | |
GB2529155A (en) | Control method, system and device | |
KR20110003695A (en) | System for predicting voucher person status |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |