WO2011073712A1 - Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile - Google Patents

Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile Download PDF

Info

Publication number
WO2011073712A1
WO2011073712A1 PCT/IB2009/007826 IB2009007826W WO2011073712A1 WO 2011073712 A1 WO2011073712 A1 WO 2011073712A1 IB 2009007826 W IB2009007826 W IB 2009007826W WO 2011073712 A1 WO2011073712 A1 WO 2011073712A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
personal key
mobile device
user data
key
Prior art date
Application number
PCT/IB2009/007826
Other languages
English (en)
Inventor
Kai Allan Inha
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Priority to PCT/IB2009/007826 priority Critical patent/WO2011073712A1/fr
Publication of WO2011073712A1 publication Critical patent/WO2011073712A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/675Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories

Definitions

  • the present application relates generally to having multiple identities on a mobile device.
  • an apparatus comprising:at least one memory including user data for a plurality of users, an interface configured to receive a user's personal key, and at least one processor configured to provide user data associated with a user when the user's personal key is connected through said interface.
  • a method comprising: storing user data for a plurality of users on a mobile device, and when a user's personal key is connected to the mobile device, providing the user data associated with the user to the user.
  • a computer program product comprising a computer-readable medium bearing computer program code embodied therein for use with a computer, the computer program code comprising: code for storing user data for a plurality of users on a mobile device, and code for pairing and unpairing a unique identifier associating with the entire storage space and functionalities, or for limiting storage space and functionalities or user data areas.
  • a personal key comprising: means to connect to a mobile device, and a unique identifier that can be read and used by the mobile device to activate user data associated with a user among a plurality of user data stored on the mobile device.
  • FIGURE 1 is a block diagram depicting an electronic device operating in accordance with an example embodiment of the invention
  • FIGURE 2 is a block diagram depicting a personal key operating in accordance with an example embodiment of the invention.
  • FIGURE 3 is a flow diagram illustrating an example method for providing a user's data with a personal key in accordance with an example embodiment of the invention
  • FIGURE 4 is a flow diagram illustrating an example method for locking a user's data in accordance with an example embodiment of the invention
  • FIGURE 5 is a block diagram depicting an electronic device and personal keys operating in accordance with an example embodiment of the invention.
  • FIGURE 6 is a picture illustrating an example use case operating in accordance with an example embodiment of the invention.
  • FIGURES 1 through 6 of the drawings An example embodiment of the present invention and its potential advantages are understood by referring to FIGURES 1 through 6 of the drawings. Multiple users in a family could share one mobile device. In addition, mobile device can be rented or given to third party to make a call. Furhtermore, the same user can have multuiple profiles in the same mobile device.
  • FIGURE 1 is a block diagram depicting an electronic device 100 operating in accordance with an example embodiment of the invention.
  • the electronic device 100 comprises a processor 110 or other processing component.
  • the electronic device 100 may comprise multiple processors, such as processor 110.
  • the electronic device 100 also comprises a user interface 130.
  • the user interface 130 comprises one or more input or output components, such as a universal serial bus (USB) connector, an audio/video jack, and/or the like.
  • USB universal serial bus
  • an electronic device 100 may comprise memory 120.
  • the electronic device may comprise volatile memory, such as random access memory (RAM).
  • Volatile memory may comprise a cache area for the temporary storage of data.
  • the electronic device 100 may also comprise non-volatile memory, which may be embedded and/or may be removable.
  • the non- volatile memory may also comprise an electrically erasable programmable read only memory, flash memory, and/or the like.
  • the processor 110 may comprise memory.
  • the processor 110 may comprise volatile memory, non-volatile memory, and/or the like.
  • the electronic device 100 may use at least one memory to store one or more users' data.
  • the user's data may comprise personal settings, user profiles, e-mails, short message service (SMS), music, pictures, videos, global positioning system (GPS) location data and history, address book, call histories, and/or the like.
  • SMS short message service
  • GPS global positioning system
  • the user's data may further comprise commonly shared documentation and/or commonly shared access rights or functionalities with other users.
  • the electronic device 100 may also use at least one memory to store one or more instructions related to a security algorithm.
  • the security algorithm is used to determine identification information, capable of uniquely identifying each user.
  • the processor 110 using the stored instructions, may determine an identity, e.g., user identity or user information, for access to the electronic device 100.
  • the processor 110 of the electronic device 100 may comprise circuitry for implementing audio feature, logic features, and/or the like.
  • the processor 110 may comprise a digital signal processor device, a microprocessor device, a digital to analog converter, other support circuits, and/or the like.
  • control and signal processing features of the processor 110 may be allocated between devices, such as the devices describe above, according to their respective capabilities.
  • the processor 110 may also comprise an internal voice coder and/or an internal data modem.
  • the processor 110 may comprise features to operate one or more software programs.
  • the processor 110 may be capable of operating a software program for connectivity, such as a conventional Internet browser.
  • the connectivity program may allow the electronic device 100 to transmit and receive Internet content, such as location-based content, other web page content, and/or the like.
  • the electronic device 100 may use a wireless application protocol (WAP), hypertext transfer protocol (HTTP), file transfer protocol (FTP) and/or the like to transmit and/or receive the Internet content.
  • WAP wireless application protocol
  • HTTP hypertext transfer protocol
  • FTP file transfer protocol
  • the electronic device 100 may be capable of operating in accordance with any of a number of a first generation communication protocol, a second generation communication protocol, a third generation communication protocol, a fourth generation communication protocol, and/or the like.
  • the electronic device 100 may be capable of operating in accordance with second generation (2G) communication protocols IS- 136, time division multiple access (TDMA), global system for mobile communication (GSM), IS- 95 code division multiple access (CDMA), and/or the like.
  • 2G second generation
  • TDMA time division multiple access
  • GSM global system for mobile communication
  • CDMA code division multiple access
  • the electronic device 100 may be capable of operating in accordance with third-generation (3G) communication protocols, such as Universal Mobile Telecommunications System (UMTS), CDMA2000, wideband CDMA (WCDMA), time division-synchronous CDMA (TD-SCDMA), and/or the like.
  • 3G Universal Mobile Telecommunications System
  • UMTS Universal Mobile Telecommunications System
  • WCDMA wideband CDMA
  • TD-SCDMA time division
  • the electronic device 100 may also be capable of operating in accordance with 3.9 generation (3.9G) wireless communication protocols, such as Evolved Universal Terrestrial Radio Access Network (E-UTRAN) or the like, or wireless communication projects, such as long term evolution (LTE) or the like. Still further, the electronic device 100 may be capable of operating in accordance with fourth generation (4G) communication protocols.
  • 3.9G 3.9 generation
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • LTE long term evolution
  • 4G fourth generation
  • the electronic device 100 may be capable of operating in accordance with a non-cellular communication mechanism.
  • the electronic device 100 may be capable of communication in a wireless local area network
  • the electronic device 100 may communicate in accordance with techniques, such as radio frequency (RF), infrared (IrDA), any of a number of WLAN techniques.
  • RF radio frequency
  • IrDA infrared
  • the electronic device 100 may communicate using one or more of the following WLAN techniques: IEEE 802.11, e.g., 802.1 la, 802.1 lb, 802. l lg, 802.11 ⁇ , and/or the like.
  • the electronic device 100 may also communicate, via a world interoperability, to use a microwave access (WiMAX) technique, such as IEEE 802.16, and/or a wireless personal area network (WPAN) technique, such as IEEE 802.15, BlueTooth (BT), ultra wideband (UWB), and/or the like.
  • WiMAX microwave access
  • WiPAN wireless personal area network
  • BT BlueTooth
  • UWB ultra wideband
  • the communications protocols described above may employ the use of signals.
  • the signals comprises signaling information in accordance with the air interface standard of the applicable cellular system, user speech, received data, user generated data, and/or the like.
  • the electronic device 100 may be capable of operating with one or more air interface standards, communication protocols, modulation types, access types, and/or the like. It should be further understood that the electronic device 100 is merely illustrative of one type of electronic device that would benefit from embodiments of the invention and, therefore, should not be taken to limit the scope of embodiments of the invention.
  • While embodiments of the electronic device 100 are illustrated and will be hereinafter described for purposes of example, other types of electronic devices, such as a portable digital assistant (PDA), a pager, a mobile television, a gaming device, a camera, a video recorder, an audio player, a video player, a radio, a mobile telephone, a traditional computer, a portable computer device, a global positioning system (GPS) device, a GPS navigation device, a GPS system, a mobile computer, a browsing device, an electronic book reader, a combination thereof, and/or the like, may be used. While several embodiments of the invention may be performed or used by the electronic device 100, embodiments may also be employed by a server, a service, a combination thereof, and/or the like.
  • PDA portable digital assistant
  • pager a mobile television
  • gaming device a gaming device
  • a camera a video recorder
  • an audio player a video player
  • a radio a mobile telephone
  • a traditional computer a portable computer device
  • GPS
  • FIGURE 2 is a block diagram depicting a personal key 200 operating in accordance with an example embodiment of the invention.
  • the personal key 200 comprises an identifier chip 210.
  • the identifier chip 210 may store one or more instructions related to a security algorithm, such as the security algorithm in memory 120 of FIGURE 1, to assist the electronic device 100 of FIGURE 1 to determine an identity, e.g., user identity or user information.
  • the identifier chip 210 is an enhanced accessory control interface (ECI) chip.
  • ECI enhanced accessory control interface
  • the identifier chip has a secret challenge-response mechanism. The challenge-response mechanism is described in further detail with respect to FIGURE 3.
  • the identifier chip has a unique identifier.
  • the unique identifier may be preset by manufacture or by user. For example, fixed, factory preset identifier number or other series of symbols, can be implemented in order to ensure secure identification of a known key.
  • the personal key 200 comprises a plug 220.
  • the plug 220 is used to connect the personal key physically to an electronic device, such as electronic device 100 of FIGURE 1.
  • the plug may be an audio/video (A V) plug.
  • the personal key 200 may not comprise a plug 220.
  • the personal key 200 may be connected physically to an electronic device through other interfaces, such as a keypad, a camera, a USB connector, and/or the like.
  • the personal key 200 is merely illustrative of one type of personal key that operates in accordance with embodiments of the invention and, therefore, should not be taken to limit the scope of embodiments of the invention. Any key mechanism may be used.
  • the personal key 200 may comprise USB device or a headset or other accessory that is equipped with an identifier chip, such as an ECI chip or other chip with similar functionalities.
  • the USB device or a headset or other accessory with an identifier chip may be paired with an electronic device.
  • An example embodiment to pair a key with an electronic device is when a user gets a new phone, regardless of whether a personal key is in the inbox or not, a user could plug a key in for the first time and define rights for that key.
  • a user could pair a key associated with the entire storage space and functionalities.
  • a user could limit the storage space and functionalities or user data areas.
  • FIGURE 3 is a flow diagram illustrating an example method for providing a user's data with a personal key in accordance with an example embodiment of the invention.
  • Example method 300 may be performed by an electronic device, such as electronic device 100 of FIGURE 1.
  • an electronic device detects connection of a personal key to an interface of the electronic device.
  • a personal key is an A/V plug with ECI chip or other chip with similar functionalities.
  • the A/V plug is inserted to the headset connector of the electronic device.
  • a personal key is a USB type of device. The USB type of device is inserted to the USB connector of an electronic device.
  • a personal key is a PIN code which may be entered in case of lost key, restored to initial settings or reset to factory settings.
  • the PIN code may be inputted to the electronic device, for example, through keypad, touch screen, and/or the like.
  • the electronic device checks whether the personal key matches a user's identity or user information. There may be one or more users' data stored in the electronic device. The electronic device may use a security algorithm stored in at least one memory of the electronic device to determine the user identity or user information associated with the personal key.
  • an ECI chip is given a number by the electronic device.
  • the ECI chip uses the number in its security algorithm to respond with another number.
  • the responded number is given to the security algorithm in the electronic device. Since the same security algorithm is running on the electronic device, the security algorithm knows the key is valid when the responded number is correct. The security algorithm may further check whether the key matches with any of the users' identity or information.
  • the one or more users each have a personal PIN code stored in at least one memory of the electronic device.
  • the security algorithm in the electronic device verifies whether the entered PIN code matches one of the users' stored PIN code.
  • the same user may have more than one personal key.
  • the user may use one key for work use, for example for access to work related information and use another key for home use, for example for access to personal non- work related information.
  • the electronic device provides the user's data to the user.
  • the user may access the user's personal settings, user profiles, e-mails, SMS, music, pictures, videos, GPS location data and history, address book, call histories, and/or the like.
  • the user may also have access to commonly shared documentation or functionalities with other users.
  • the example method 300 ends.
  • the example method 300 ends. In an alternative embodiment, if there is no match of user identity or information, then the method returns to block 310 or block 320. [0039]
  • the example method 300 for providing a user's data with a personal key disclosed herein is merely an example and, therefore, should not be taken to limit the scope of embodiments of the invention.
  • FIGURE 4 is a flow diagram illustrating an example method for locking a user's data in accordance with an example embodiment of the invention.
  • Example method 400 may be performed by an electronic device, such as electronic device 100 of FIGURE 1.
  • an electronic device detects disconnection of a personal key of a user from the electronic device.
  • a processor of the electronic device activates a timer when the device detects disconnection of a personal key from the device.
  • the timer may have a predefined period of time.
  • the timer is settable in the device's settings. For example, an "auto lock period" may be used to set the predefined period of time.
  • the user's data remains active during the predefined period of time. This allows the user to use the electronic device's connectivity features without the key inserted.
  • the predefined period of time may comprise a value of zero, therefore a user's data may be locked when a key is disconnected from an electronic device.
  • a personal key is an A V plug with ECI chip or other chip with similar functionalities.
  • the A/V plug is disconnected from a headset connector of an electronic device, the user's data remains active during the predefined pe od of time. This allows the user to reserve the headset connector for other use, such as insertion of a wired headset.
  • a personal key is a USB type of device. When the USB type of device is disconnected from a USB connector of an electronic device, the user's data remains active during the predefined period of time. This allows the user to reserve the USB connector for other use, such as insertion of a USB device.
  • a USB device or a headset with an identifier chip could also be used as a personal key.
  • the USB device or a headset integrates the identifier chip or functionalities in the identifier chip.
  • the timer may be set with a value of zero in this example embodiment, therefore a user's data may be locked when a key is disconnected from an electronic device.
  • an electronic device may lock a user's data when the electronic device detects connection of a personal key to the device.
  • an electronic device may lock a user's data when the user closes the lid of a phone, locks the keyboard, selects "close account” from the menu, turns the phone to "off state” or when the phone battery runs out of power.
  • FIGURE 5 is a block diagram depicting an electronic device 510 and personal keys operating in accordance with an example embodiment of the invention.
  • the electronic device 510 may be similar to electronic device 100 of FIGURE 1.
  • the electronic device 510 comprises at least one memory 520 to store data of one or more users.
  • user l's data is stored at 530 and user 2's data is stored at 540.
  • the personal keys 560, 570 and 580 may be similar to personal key 200 of FIGURE 2.
  • personal key 1 560 when personal key 1 560 is connected to electronic device 510, user 1 's data stored in 530 and/or user rights are provided in the electronic device 510.
  • personal key 2 570 when personal key 2 570 is connected to electronic device 510, user 2's data stored in 540 and/or user rights are provided in the electronic device 510.
  • some keys can be programmed to have rights over some other keys for allowed functionalities and access rights.
  • personal key 3 580 is programmed to have rights over key 1 560 and key 2 570. When personal key 3 580 is connected to electronic device 510, both user l's and user 2's data in 530 and 540 and/or user rights may be accessed in the electronic device 510.
  • FIGURE 6 is a picture illustrating an example use case operating in accordance with an example embodiment of the invention.
  • the example use case 600 comprises an electronic device 610, such as electronic device 100 of FIGURE 1.
  • the example use case 600 may further comprise a wrist strap 620, with for example a 2.5 mm or 3.5 mm A/V plug 630, such as the plug 220 of FIGURE 2, and ECI chip 640, such as the identifier chip 210 of FIGURE 2.
  • a technical effect of one or more of the example embodiments disclosed herein may be enabling multiple users to use the same electronic device. Another technical effect of one or more of the example embodiments disclosed herein may be enabling safe rental or lease of an electronic device to a user without leaking out other users' data or identity. Another technical effect of one or more of the example embodiments disclosed herein may be using a personal key to access a user's data on the electronic device.
  • Embodiments of the present invention may be implemented in software, hardware, application logic or a combination of software, hardware and application logic.
  • the software, application logic and/or hardware may reside on an electronic device or a personal key. If desired, part of the software, application logic and/or hardware may reside on an electronic device and part of the software, application logic and/or hardware may reside on a personal key.
  • the application logic, software or an instruction set is maintained on any one of various conventional computer-readable media.
  • a "computer-readable medium" may be any media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer-readable medium may comprise a computer-readable storage medium that may be any media or means that can contain or store the instructions for use by or in connection with an instruction execution system, apparatus, or device.
  • the different functions discussed herein may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the above-described functions may be optional or may be combined.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

Dans un mode de réalisation illustratif, la présente invention se rapporte à un appareil comprenant : au moins une mémoire contenant des données utilisateur relatives à une pluralité d'utilisateurs ; une interface configurée de façon à recevoir une clé personnelle d'un utilisateur ; et au moins un processeur configuré de façon à fournir des données utilisateur associées à un utilisateur quand la clé personnelle de l'utilisateur est connectée via ladite interface.
PCT/IB2009/007826 2009-12-18 2009-12-18 Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile WO2011073712A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2009/007826 WO2011073712A1 (fr) 2009-12-18 2009-12-18 Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2009/007826 WO2011073712A1 (fr) 2009-12-18 2009-12-18 Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile

Publications (1)

Publication Number Publication Date
WO2011073712A1 true WO2011073712A1 (fr) 2011-06-23

Family

ID=44166799

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2009/007826 WO2011073712A1 (fr) 2009-12-18 2009-12-18 Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile

Country Status (1)

Country Link
WO (1) WO2011073712A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013124689A2 (fr) * 2012-02-23 2013-08-29 Silicon Green Limited Dispositif de communication mobile
US10893045B2 (en) 2013-08-29 2021-01-12 Liberty Labs Limited System for accessing data from multiple devices

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030139192A1 (en) * 2002-01-18 2003-07-24 Mazen Chmaytelli Multi-user mobile telephone station and a method of providing a multi-user mobile telephone station
US20050159184A1 (en) * 2004-01-16 2005-07-21 U.S. Thermoelectric Consortium Wireless communications apparatus and method
US20050210271A1 (en) * 2003-11-28 2005-09-22 Lightuning Tech. Inc. Electronic identification key with portable application programs and identified by biometrics authentication
US20080034217A1 (en) * 2006-07-18 2008-02-07 Bellsouth Intellectual Property Corporation Security For A Personal Communication Device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030139192A1 (en) * 2002-01-18 2003-07-24 Mazen Chmaytelli Multi-user mobile telephone station and a method of providing a multi-user mobile telephone station
US20050210271A1 (en) * 2003-11-28 2005-09-22 Lightuning Tech. Inc. Electronic identification key with portable application programs and identified by biometrics authentication
US20050159184A1 (en) * 2004-01-16 2005-07-21 U.S. Thermoelectric Consortium Wireless communications apparatus and method
US20080034217A1 (en) * 2006-07-18 2008-02-07 Bellsouth Intellectual Property Corporation Security For A Personal Communication Device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013124689A2 (fr) * 2012-02-23 2013-08-29 Silicon Green Limited Dispositif de communication mobile
WO2013124689A3 (fr) * 2012-02-23 2013-11-14 Silicon Green Limited Dispositif de communication mobile
GB2516589A (en) * 2012-02-23 2015-01-28 Sim & Pin Ltd User dependent functions and data in a mobile communication device
GB2516589B (en) * 2012-02-23 2019-11-20 Liberty Vaults Ltd Mobile communication device
US10979550B2 (en) 2012-02-23 2021-04-13 TapNav Ltd Mobile communication device
US10893045B2 (en) 2013-08-29 2021-01-12 Liberty Labs Limited System for accessing data from multiple devices

Similar Documents

Publication Publication Date Title
EP2345270B1 (fr) Procédé, appareil et produit-programme informatique adaptés pour assurer la sécurité d'une carte à puce intelligente
US9167432B2 (en) Coordinated security systems and methods for an electronic device
US20070264981A1 (en) Restricted feature access for portable electronic devices
CN108521494A (zh) 终端控制方法和装置、可读存储介质、终端
US20080133775A1 (en) Method, Apparatus and Computer Program Product for Providing Intelligent Synchronization
JP2010198384A (ja) 通信端末装置
CA2665018C (fr) Systemes et methodes de securite coordonnes applicables a un dispositif electronique
RU2359311C2 (ru) Управление доступом к терминалу
WO2009081292A1 (fr) Procédé, appareil et produit-programme informatique pour la mise en œuvre de caractéristiques de sécurité d'une commande de puissance
CN108537058A (zh) 终端的多角色使用方法和装置、计算机可读存储介质、终端
EP1864475A1 (fr) Procede, dispositif, systeme et programme informatique de commande d'une activite de connexion externe basee sur des modalites precises
EP2041942B1 (fr) Partage contrôlé de données personnelles
JP2009088917A (ja) 携帯端末装置、および、プログラム
WO2011073712A1 (fr) Procédé et appareil permettant d'avoir une pluralité d'identités sur un dispositif mobile
JP3637337B2 (ja) 移動通信端末
KR20080070391A (ko) 휴대 단말기 원격 제어 방법 및 시스템
CN103458394A (zh) 移动终端内部信息的处理方法、装置及移动终端
CN202503577U (zh) 人脸识别防盗手机
JP5870594B2 (ja) 携帯端末、電力制御方法及び電力制御プログラム
CN107154999B (zh) 终端及其基于环境信息的解锁方法、存储装置
US20070130435A1 (en) Terminal apparatus and its data management method
JP2004229240A (ja) 携帯電話機
JP2008228068A (ja) 携帯通信端末及び通信システム
CN111866266A (zh) 智能终端及其解锁方法、可穿戴设备及存储装置
JP2004356685A (ja) 携帯通信端末及び携帯通信端末制御システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09852222

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09852222

Country of ref document: EP

Kind code of ref document: A1