imax500 (Australia)
Security Device for Smartphones
The core of this invention is the inclusion of a security routine, either in the OS, in the cloud, in the firmware or as an application of the device, or other. This security system operates as follows; (1) a pattern if typical usage is constantly recorded and becomes a training set, (2) if the pattern of usage is detected that is not consistent with the training set then the user is asked for a secure password, (3) if this password is not entered then the device is locked down, or wiped or other secure actions take place.

Firstly, after the software system is installed on a device the software starts recording all user inputs and usage patterns, including:
1. Touch screen inputs, inclusive of typical errors and typos made
2. Voice entry and phone calls, inclusive of person recognition by voice characteristics
3. Application menu options selected, the order of menu selection, typical times and dates for specific application to be used etc
4. Types of websites visited
Smart algorithms running on the phone or a cloud computer then convert this common usage data into algorithms that detect uncommon usage, which are indicators of a third party using the smart device. If this is detected the suspected third party user is asked for a password, which if not supplied enables the phone to be locked down or even wiped, or any other secure action taken. Note there are two types of common usage modes that can be detected:
1. When actual usage does not match the training set by action (e.g. when certain touch screen errors are not made), or
2. When certain function are not performed when they normally are (e.g. a weather website is not visited as it usually is).

Return to the Creativity Pool