imax500 (Australia) Security Device for Smartphones Firstly, after the software system is installed on a device the software starts recording all user inputs and usage patterns, including: 1. Touch screen inputs, inclusive of typical errors and typos made 2. Voice entry and phone calls, inclusive of person recognition by voice characteristics 3. Application menu options selected, the order of menu selection, typical times and dates for specific application to be used etc 4. Types of websites visited Smart algorithms running on the phone or a cloud computer then convert this common usage data into algorithms that detect uncommon usage, which are indicators of a third party using the smart device. If this is detected the suspected third party user is asked for a password, which if not supplied enables the phone to be locked down or even wiped, or any other secure action taken. Note there are two types of common usage modes that can be detected: 1. When actual usage does not match the training set by action (e.g. when certain touch screen errors are not made), or 2. When certain function are not performed when they normally are (e.g. a weather website is not visited as it usually is). |