Abstract: A system for achieving security of information by disabling certain features of mobile phones, said system comprising: client application, embedded in said mobile phone, adapted to provide location based service application, said client application means comprising: a latitude and longitude tracker for identifying the latitudinal and longitudinal co-ordinates of said mobile phone , a comparator adapted to receive said latitudinal and longitudinal co-ordinates in order to compare said identified latitudinal and longitudinal co-ordinates with pre- stored restricted zones having latitudinal and longitudinal co-ordinates to obtain a comparison score; and a disabling/enabling means adapted to disable/enable pre-defined means of said mobile phone based on said comparative score; and - and a server application, communicably coupled to said client application, adapted to store latitudinal and longitudinal co-ordinates of said restricted zones
FORM-2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
SYSTEM FOR ACHIEVING SECURITY OF INFORMATION BY DISABLING CERTAIN FEATURES OF MOBILE PHONES
TATA CONSULTANCY SERVICES LTD.,
an Indian Company of Nirmal Building, 9l floor, Nariman Point, Mumbai 400 021, Maharashtra, India
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED
FIELD OF THE INVENTION
The present invention relates to the field of telecommunications.
BACKGROUND OF THE INVENTION AND PRIOR ART
Security is one of the prime concerns in today's time. With advances in mobile technology everyone can now possess a mobile phone with features like camera, Bluetooth, Infra Red and Wi-Fi. These features pose a threat to the security, as anyone can easily click photographs or transmit information even in restricted zones. It becomes difficult for authorities of the restricted zones to keep a check on the mobile phones as a person can pretend to talk on the phone while he/she is taking a video recording of the place thus, raising security threats.
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Protecting this confidential information is a business requirement, in many cases also an ethical and legal requirement. Highly restricted zones including heritage structures, defense areas, corporate offices, historical structures, hospitals, airports and bridges are zones in which we cannot use mobile phones, cameras and the instruments / equipments that are a means of data transfer. One is expected to obey to the guidelines of these restricted zones, but nowadays, only a few follow the rules and guidelines. This negligence of rules and guidelines is leading to information loss/theft and a major security concern.
Nowadays, numerous information theft instances are happening over the world in different domains. People are using very innovative ways to steal information. Terrorists steal important security related information and use this information in different ways to attack their enemies. Corporate offices, defense areas use
mobile network jammers to block the network signal so that no one can use the mobile for voice / SMS (Short Messaging Service) conversation. There are specially designed equipments available in the market to block features like IR, Bluetooth and camera, but these are available at high prices. There are no mobile based applications available for blocking these features hence the quest for alternative economical means which can automatically restrict the use of the features which pose security threats in restricted areas.
PRIOR ART
United States Patent application 2008/0220715 discloses a usage specification device which is used to limit the use of information signals (audio, image, data) and to limit the output of disturbing signals (speaker, flash, light, RF transmission) in several devices in a large restricted area. For example, the usage specification device may transmit a certain type of control signal to disable image capture by camera-equipped portable mobile devices, or it may transmit other types of control signals to disable audio capture (Microphone) or data capture (WiFi, Bluetooth, IR) by such devices. Similarly, the specification device may transmit a certain type of control signal to reduce the speaker volume on portable mobile devices, or it may transmit other types of control signals to disable the flash, or minimize the intensity of light emitted by the display or restrict the transmission of RF signals from such devices; such signals are decoded by the mobile devices for performing intended functions. Due to such features, only undesirable features of portable mobile devices may be prevented in restricted areas, while permitting other uses.
However, this document only discloses use of a control signals sent by the usage specification device to control the use certain features of the wireless device and
there is no mention of dynamic comparison of user's current location and the geographic co-ordinates of the restricted zone at a server.
Chinese Patent document CN2704974 discloses a utility model which relates to a wireless camera interference unit which is arranged near a target area for scanning the area for any un-authorized wireless emitting sources, the wireless camera interference unit forcibly intervenes the un-authorized wireless emitting source, and restricts the use of camera.
The assembly as disclosed in this document needs to be fitted around the region of deployment, which is not a feasible solution.
OBJECTS OF THE INVENTION
It is an object of the present invention to provide a system for automatically disabling the data transfer features of a mobile phone on entering a restricted zone.
It is another object of the present invention to provide a cost-effective system for achieving security of information by disabling certain features of mobile phones.
It is yet another object of the present invention to activate the disabled features once the user steps out of the restricted zone.
It is still another object of the present invention to provide a system which protects confidential information from security threats.
Another object of the present invention is to provide a user friendly system which achieves maximum level of information security.
SUMMARY OF THE INVENTION
The present invention envisages a system for achieving security of information by disabling certain features of mobile phones. The invention consists of a client and a server application for realizing the system.
According to this invention, there is provided a system for achieving security of information by disabling certain features of mobile phones, said system comprises:
- client application, embedded in said mobile phone, adapted to provide location based service application, said client application means comprising: a latitude and longitude tracker for identifying the latitudinal and longitudinal co-ordinates of said mobile phone , a comparator adapted to receive said latitudinal and longitudinal co-ordinates in order to compare said identified latitudinal and longitudinal co-ordinates with pre-stored restricted zones having latitudinal and longitudinal co-ordinates to obtain a comparison score; and a disabling/enabling means adapted to disable/enable pre-defined means of said mobile phone based on said comparative score; and
- and a server application, communicably coupled to said client application, adapted to store latitudinal and longitudinal co-ordinates of said restricted zones
Typically, said pre-defined means includes data transfer means of said mobile phone.
Typically, said pre-defined means includes hardware components of said mobile phone.
Typically, said pre-defined means includes software components of said mobile phone.
Typically, said server application includes means to register latitudinal and longitudinal co-ordinates in order to define restricted zones.
Typically, said server application includes means to register name of said restricted zone.
Typically, said server application includes means to register name of owner of said restricted zone.
Typically, said client application means and said server means includes communication means in order to communicably couple said client application means and said server means.
Typically, said client application means and said server means includes GPRS (General Packet Radio Service) based communication means in order to communicably couple said client application means and said server means.
Typically, said server application includes an interface means for receiving incoming requests from said client application means.
Typically, said server application includes a repository for storing at least the latitudinal and longitudinal co-ordinates of said restricted zones.
Typically, said latitude and longitude tracker includes a GPS (Global Positioning System) receiver adapted to continuously track the latitudinal and longitudinal location co-ordinates of said mobile phone.
Typically, said client application means includes means to communicate said latitudinal and longitudinal co-ordinates to said comparator whenever said latitudinal and longitudinal co-ordinates change.
In accordance with this invention, the client application is a LBS (Location Based Service) application which tracks the lat / long positions of the handset. A corporate firm or a high secured zone will have to register with the server application of this invention as a high security zone and provide their lat/long positions. Thereafter, whenever users will enter into that zone, the application will deactivate all the means of data transfer, thus eliminating the need for expensive network jammers and data transfer blocking means.
The server application collects and maintains the data of high security zones. This data includes the following details:
o Lat / Long positions of the high security zones
o Name of the zone o Owner of the zone
BRIEF DESCRIPTION OF ACCOMPANYING DRAWING
The present invention will now be described in relation to the accompanying drawing, in which:
FIGURE 1 illustrates a schematic of the system for providing security of information by disabling certain features of mobile phones.
DESCRIPTION OF THE INVENTION
The invention for providing security of information by disabling certain features of mobile phones will now be described with reference to the accompanying drawing which does not limit the scope and ambit of the invention. The description provided is purely by way of example and illustration.
In accordance with the present invention, there is proposed a system and a method for providing security of information by disabling certain features of mobile phones.
In accordance with one aspect of the present invention, the system comprises a server and a client application. The client application is embedded in the hardware of the mobile phone handsets and the server application is hosted on a web server of the service provider. The client and the server applications typically communicate with each other using the GPRS (General Packet Radio Service) facility.
In accordance with another aspect of the present invention, to avail the features of the system the corporate firms and premises which are restricted zones will have to enroll with the application server of the system.
FIGURE 1 illustrates a schematic of the system for providing security of information by disabling certain features of mobile phones.
The server application 10 hosts an interface for receiving incoming requests from the client application 12 and a repository for storing the details of the enrolled firms and the locations of the restricted zone. The repository holds details including the latitude and longitude position of the restricted zone, name of the premise and the owner details.
The client application 12 is embedded in the handsets and communicates with the remote server application 10 via GPRS. The client application 12 is a location based service application and consists of the following components: a lat/long tracker 14, a comparator 16 and a disabling/enabling means 18.
In accordance with the invention, the lat/long tracker 14 has a GPS (Global Positioning System) receiver which continuously tracks the latitude and longitude location co-ordinates of the mobile handsets and these received location co-ordinates are sent to the comparator 16 each time the location details change. The location details are sent to the server application 10 for comparison with the lat/long co-ordinates stored in the repository. If the co-ordinates match the restricted zone co-ordinates the comparator 16 gives the feedback to the disabling and enabling means 18 which based on the feedback takes the necessary action. If the feedback is positive then the data transfer means like
camera, Bluetooth, IR and Wi-Fi are disabled and if the feedback is negative the data transfer means are activated.
The disabling and enabling means 18 on a positive feedback disable both the hardware and software access of the data transfer means, for instance if the handset is in the restricted zone, the disabling and enabling means 18 will disable the designated hardware key for the camera on the handset keypad and also disable the software based menu for the camera. Thus, the user will not be able to activate this feature. Similar hardware and software blocking can be done for Bluetooth, Wi-Fi and IR data transfer features.
TECHNICAL ADVANTAGES
The technical advancements of the present invention include:
• providing a cost-effective system for security of information;
• providing a system which automatically disables the data transfer features of a mobile phone on entering a restricted zone;
• providing a user-friendly system for achieving security of information by disabling certain features of mobile phones;
• providing a system which automatically activates the disabled features once the user steps out of the restricted zone;
• providing a system which protects confidential information from security threats; and
• providing a system which disables the hardware and software activation methods of the data transfer means like camera, IR, Bluetooth and Wi-Fi when the handset enters a restricted zone.
While considerable emphasis has been placed herein on the particular features of this invention, it will be appreciated that various modifications can be made, and
that many changes can be made in the preferred embodiments without departing from the principles of the invention. These and other modifications in the nature of the invention or the preferred embodiments will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the invention and not as a limitation.
We Claim:
1. A system for achieving security of information by disabling certain features of mobile phones, said system comprising:
- client application, embedded in said mobile phone, adapted to provide location based service application, said client application means comprising: a latitude and longitude tracker for identifying the latitudinal and longitudinal co-ordinates of said mobile phone , a comparator adapted to receive said latitudinal and longitudinal co-ordinates in order to compare said identified latitudinal and longitudinal co-ordinates with pre-stored restricted zones having latitudinal and longitudinal co-ordinates to obtain a comparison score; and a disabling/enabling means adapted to disable/enable pre-defined means of said mobile phone based on said comparative score; and
- and a server application, communicably coupled to said client application, adapted to store latitudinal and longitudinal co-ordinates of said restricted zones
2. A system as claimed in claim 1 wherein, said pre-defined means includes data transfer means of said mobile phone.
3. A system as claimed in claim 1 wherein, said pre-defined means includes hardware components of said mobile phone.
4. A system as claimed in claim 1 wherein, said pre-defined means includes software components of said mobile phone.
5. A system as claimed in claim 1 wherein, said server application includes means to register latitudinal and longitudinal co-ordinates in order to define restricted zones.
6. A system as claimed in claim 1 wherein, said server application includes means to register name of said restricted zone.
7. A system as claimed in claim 1 wherein, said server application includes means to register name of owner of said restricted zone.
8. A system as claimed in claim 1 wherein, said client application means and said server means includes communication means in order to communicably couple said client application means and said server means.
9. A system as claimed in claim 1 wherein, said client application means and said server means includes GPRS (General Packet Radio Service) based communication means in order to communicably couple said client application means and said server means.
10.A system as claimed in claim 1 wherein, said server application includes an
interface means for receiving incoming requests from said client application
means. 11.A system as claimed in claim 1 wherein, said server application includes a
repository for storing at least the latitudinal and longitudinal co-ordinates of
said restricted zones. 12.A system as claimed in claim 1 wherein, said latitude and longitude tracker
includes a GPS (Global Positioning System) receiver adapted to continuously
track the latitudinal and longitudinal location co-ordinates of said mobile
phone.
13.A system as claimed in claim 1 wherein, said client application means includes means to communicate said latitudinal and longitudinal co-ordinates to said comparator whenever said latitudinal and longitudinal co-ordinates change.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 2438-MUM-2009-FORM 5(20-10-2010).pdf | 2010-10-20 |
| 1 | 2438-MUM-2009-RELEVANT DOCUMENTS [28-09-2023(online)].pdf | 2023-09-28 |
| 2 | 2438-MUM-2009-FORM 2(TITLE PAGE)-(20-10-2010).pdf | 2010-10-20 |
| 2 | 2438-MUM-2009-RELEVANT DOCUMENTS [26-09-2022(online)].pdf | 2022-09-26 |
| 3 | 2438-MUM-2009-RELEVANT DOCUMENTS [30-09-2021(online)].pdf | 2021-09-30 |
| 3 | 2438-mum-2009-form 2(20-10-2010).pdf | 2010-10-20 |
| 4 | 2438-MUM-2009-IntimationOfGrant25-02-2020.pdf | 2020-02-25 |
| 4 | 2438-MUM-2009-DRAWING(20-10-2010).pdf | 2010-10-20 |
| 5 | 2438-MUM-2009-PatentCertificate25-02-2020.pdf | 2020-02-25 |
| 5 | 2438-MUM-2009-DESCRIPTIONCOMPLETE)-(20-10-2010).pdf | 2010-10-20 |
| 6 | 2438-MUM-2009-Written submissions and relevant documents (MANDATORY) [12-11-2019(online)].pdf | 2019-11-12 |
| 6 | 2438-MUM-2009-CORRESPONDENCE(20-10-2010).pdf | 2010-10-20 |
| 7 | 2438-MUM-2009-ORIGINAL UR 6(1A) FORM 26-041119.pdf | 2019-11-06 |
| 7 | 2438-MUM-2009-CLAIMS(20-10-2010).pdf | 2010-10-20 |
| 8 | 2438-MUM-2009-ORIGINAL UR 6(1A) FORM 26-241019.pdf | 2019-10-26 |
| 8 | 2438-MUM-2009-ABSTACT(20-10-2010).pdf | 2010-10-20 |
| 9 | 2438-MUM-2009-FORM 18(30-11-2010).pdf | 2010-11-30 |
| 9 | 2438-MUM-2009-FORM-26 [24-10-2019(online)].pdf | 2019-10-24 |
| 10 | 2438-MUM-2009-CORRESPONDENCE(30-11-2010).pdf | 2010-11-30 |
| 10 | 2438-MUM-2009-FORM-26 [21-10-2019(online)].pdf | 2019-10-21 |
| 11 | 2438-MUM-2009-HearingNoticeLetter-(DateOfHearing-04-11-2019).pdf | 2019-10-01 |
| 11 | Other Document [08-08-2016(online)].pdf | 2016-08-08 |
| 12 | 2438-MUM-2009-CORRESPONDENCE(8-12-2009).pdf | 2018-08-10 |
| 12 | Examination Report Reply Recieved [08-08-2016(online)].pdf | 2016-08-08 |
| 13 | 2438-mum-2009-correspondence.pdf | 2018-08-10 |
| 13 | Description(Complete) [08-08-2016(online)].pdf | 2016-08-08 |
| 14 | Claims [08-08-2016(online)].pdf | 2016-08-08 |
| 15 | 2438-mum-2009-description(provisional).pdf | 2018-08-10 |
| 15 | Abstract [08-08-2016(online)].pdf | 2016-08-08 |
| 16 | 2438-mum-2009-drawing.pdf | 2018-08-10 |
| 16 | abstract1.jpg | 2018-08-10 |
| 17 | 2438-MUM-2009_EXAMREPORT.pdf | 2018-08-10 |
| 17 | 2438-MUM-2009-FORM 1(8-12-2009).pdf | 2018-08-10 |
| 18 | 2438-mum-2009-form 3.pdf | 2018-08-10 |
| 18 | 2438-mum-2009-form 1.pdf | 2018-08-10 |
| 19 | 2438-mum-2009-form 2(title page).pdf | 2018-08-10 |
| 19 | 2438-mum-2009-form 26.pdf | 2018-08-10 |
| 20 | 2438-mum-2009-form 2.pdf | 2018-08-10 |
| 21 | 2438-mum-2009-form 2.pdf | 2018-08-10 |
| 22 | 2438-mum-2009-form 2(title page).pdf | 2018-08-10 |
| 22 | 2438-mum-2009-form 26.pdf | 2018-08-10 |
| 23 | 2438-mum-2009-form 1.pdf | 2018-08-10 |
| 23 | 2438-mum-2009-form 3.pdf | 2018-08-10 |
| 24 | 2438-MUM-2009-FORM 1(8-12-2009).pdf | 2018-08-10 |
| 24 | 2438-MUM-2009_EXAMREPORT.pdf | 2018-08-10 |
| 25 | abstract1.jpg | 2018-08-10 |
| 25 | 2438-mum-2009-drawing.pdf | 2018-08-10 |
| 26 | 2438-mum-2009-description(provisional).pdf | 2018-08-10 |
| 26 | Abstract [08-08-2016(online)].pdf | 2016-08-08 |
| 27 | Claims [08-08-2016(online)].pdf | 2016-08-08 |
| 28 | 2438-mum-2009-correspondence.pdf | 2018-08-10 |
| 28 | Description(Complete) [08-08-2016(online)].pdf | 2016-08-08 |
| 29 | 2438-MUM-2009-CORRESPONDENCE(8-12-2009).pdf | 2018-08-10 |
| 29 | Examination Report Reply Recieved [08-08-2016(online)].pdf | 2016-08-08 |
| 30 | 2438-MUM-2009-HearingNoticeLetter-(DateOfHearing-04-11-2019).pdf | 2019-10-01 |
| 30 | Other Document [08-08-2016(online)].pdf | 2016-08-08 |
| 31 | 2438-MUM-2009-CORRESPONDENCE(30-11-2010).pdf | 2010-11-30 |
| 31 | 2438-MUM-2009-FORM-26 [21-10-2019(online)].pdf | 2019-10-21 |
| 32 | 2438-MUM-2009-FORM 18(30-11-2010).pdf | 2010-11-30 |
| 32 | 2438-MUM-2009-FORM-26 [24-10-2019(online)].pdf | 2019-10-24 |
| 33 | 2438-MUM-2009-ABSTACT(20-10-2010).pdf | 2010-10-20 |
| 33 | 2438-MUM-2009-ORIGINAL UR 6(1A) FORM 26-241019.pdf | 2019-10-26 |
| 34 | 2438-MUM-2009-CLAIMS(20-10-2010).pdf | 2010-10-20 |
| 34 | 2438-MUM-2009-ORIGINAL UR 6(1A) FORM 26-041119.pdf | 2019-11-06 |
| 35 | 2438-MUM-2009-CORRESPONDENCE(20-10-2010).pdf | 2010-10-20 |
| 35 | 2438-MUM-2009-Written submissions and relevant documents (MANDATORY) [12-11-2019(online)].pdf | 2019-11-12 |
| 36 | 2438-MUM-2009-DESCRIPTIONCOMPLETE)-(20-10-2010).pdf | 2010-10-20 |
| 36 | 2438-MUM-2009-PatentCertificate25-02-2020.pdf | 2020-02-25 |
| 37 | 2438-MUM-2009-DRAWING(20-10-2010).pdf | 2010-10-20 |
| 37 | 2438-MUM-2009-IntimationOfGrant25-02-2020.pdf | 2020-02-25 |
| 38 | 2438-mum-2009-form 2(20-10-2010).pdf | 2010-10-20 |
| 38 | 2438-MUM-2009-RELEVANT DOCUMENTS [30-09-2021(online)].pdf | 2021-09-30 |
| 39 | 2438-MUM-2009-RELEVANT DOCUMENTS [26-09-2022(online)].pdf | 2022-09-26 |
| 39 | 2438-MUM-2009-FORM 2(TITLE PAGE)-(20-10-2010).pdf | 2010-10-20 |
| 40 | 2438-MUM-2009-RELEVANT DOCUMENTS [28-09-2023(online)].pdf | 2023-09-28 |
| 40 | 2438-MUM-2009-FORM 5(20-10-2010).pdf | 2010-10-20 |