Abstract: A method of accessing a partition on a mobile communication device comprises receiving data specifying a partition; receiving an identification code from an identification module in or associated with the device; determining based on both the data specifying a partition and the identification code whether access to the specified partition is to be allowed; and allowing or denying access to the specified partition accordingly.
Mobile communication device
The present invention relates to the field of mobile communication devices.
In particular, it relates to a mobile communication device on which a user can
5 switch between different partitions or profiles.
It is currently known to have multiple different users on an operating system
in a PC environment using a UID (user ID) combined with a respective password to
toggle between them.
It is also known to have dual SIM mobile phones.
10 People have also considered the possibility of providing a multi-user mobile
phone.
However, the inventors of the present invention have realised that there is a
desire for a single user to be able to have different profiles or partitions on a single
mobile communication device, such as a work profile and a home profile, for
15 example. This could enable them, for example, to keep different aspects of their life
separate without having to have multiple devices. As far as the inventors are
aware, no mobile communication device currently available allows a user to have
multiple profiles or partitions on a single device so that they can partition content
(user-generated or otherwise) and functionality between these profiles.
20 US 201010323664 A1 discloses a mobile device for multiple users. Each
user has hislher own dedicated memory partition in which they can readlwrite data.
Each partition is associated with a different smart card ID and a user must insert
hislher smart card into the device in order to access hislher partition.
GB 2408179 A discloses a mobile telephone for multiple users where each
25 user can configure the telephone to operate in a particular manner. The phone
uses a single SIM card and each user must enter a PINlpasscode in order to be
able to use the telephone.
According to a first aspect of the invention, there is provided a method of
accessing a partition or switching between partitions on a mobile communication
30 device, the method comprising: receiving data specifying a partition; receiving an
identification code from an identification module associated with the device;
determining, based on the data specifying a partition and the identification code,
whether access to the selected partition is to be allowed; and allowing or denying
access to the selected partition accordingly.
The identification module could be or comprise a removable identification
module, a remote identification module, a SIM card, hardware, a secure element, a
trusted execution environment (TEE), or a software SIM, for example. The
identification module could be provided in the device or remotely.
5 Thus, according to the first aspect, a user can access a partition or switch
between partitions on their mobile device only when a verification based on both the
data specifying the partition and an identification code from an identification module
associated with the device (e.g. a SIM card or hardware or secure element or TEE
in the device) has been made. By requiring an identification code from an
10 identification module associated with the device (e.g, a SIM card or hardware or
secure element or TEE in the device) as part of the verification process this
provides security to the user because a partition can only be accessed on the
appropriate device, or on a device with the correct identification module (e.g. SIM
card or hardware or secure element or TEE).
15 Preferably, more than one partition may be accessed and controlled via a
single and unique SIM card (or other identification module of the device). More
preferably, all of a user's partitions are accessible via a single unique SIM card (or
other identification module of the device). Thus, there is advantageously no need
for a separate SIM card (or identification module) for each partition accessible on
20 the mobile device, and so no need to switch from one SIM or identification module
to another to access different partitions.
A partition may have predefined content and/or functionality.
The data specifying a partition may specify, for example, the content andlor
functionality of the partition, a name andlor passcode of the partition, and/or a path
25 to a cloud or external server from which data specifying the content andlor
functionality of the partition can be downloaded.
Preferably, the method comprises sending the identification code from the
identification module to open the specified partition when access to the specified
partition is allowed.
30 The method may comprise sending or displaying a message indicating that
access to the specified partition is not allowed when access to the specified
partition is not allowed.
The method may comprise sending the data specifying a partition and the
identification code from the identification module to a partition entry module when
35 access to the specified partition is allowed. In this case, the data specifying a
partition and the identification code are preferably sent from the identification
module to a partition entry module via a secure channel. A secure channel may be
created by a mutual authentication process between the identification module and
the partition entry module, for example.
5 The method may advantageously comprise encrypting the data specifying a
partition andlor the identification code before sending them to the partition entry
module.
An initialisation process for accessing a partition preferably involves
associating data specifying a partition (e.g. a PIN or passcode) with identification
10 data from an identification module associated with the device. Thus, more than one
data specifying a partition (e.g. a PIN or passcode) may be associated with a single
identification data from an identification module associated with the device. The
identification code or identification data from the identification module associated
with the device could be a unique hardware identifier such as the IMEl
15 (International Mobile Equipment Identity), for example.
Preferably, the data specifying a partition and identification code are verified
in the identification module to determine whether access to the specified partition is
to be allowed.
The method preferably comprises generating the identification code in the
20 identification module based on the data specifying a partition, and preferably also
based on identification data of the identification module.
The identification code may be a certificate, for example, which may be
generated from identification data of the identification module andlor the data
specifying the partition.
25 In some embodiments, where one or more partitions are stored in the cloud
or at an external server, preferably a mutual authentication process is performed
between the SIM (or other identification module) in the mobile communication
device and a virtual or physical SIM or SAM (or other identification module) in the
cloud before access to the partition in the cloud is allowed. Thus, security levels
30 provided at the mobile communication device may be extended to the cloud.
Preferably, the mutual authentication process is performed before the passcode or
data specifying the partition is checked.
When a partition is accessed, preferably only content specified to be
available in that partition is accessible to the user. In addition or alternatively, a
35 partition may have a predefined configuration or set-up so that when a user
accesses that partition their device will automatically change to that configuration.
A configuration could, for example, specify device functionality such as ring volume,
call divert function, vibrate function, and whether functionalities such as Bluetooth.
SMS, MMS and internet are on or off, etc.
5 Preferably, when a user has accessed a partition on a mobile device, any
content, such as SMSlMMS messages, photos, images, videos, documents,
browsing history, Internet passwords/usernames etc., obtained (e.g. downloaded
onto the device, received via a wireless communication network, or
photographs/videos taken by the device) whilst the that partition is accessed is
10 subsequently accessible only when that partition, and perhaps one further partition
constituting an "administrator" partition, is accessed on the mobile device. The
content could be stored on the mobile device, for example in the partition in which it
was obtained andlor, for example, it could be stored remotely in a cloud or server.
By using a cloud or other server to store some or all of the partition data remotely,
15 this can provide a useful backup if a mobile device is lost or stolen andlor a larger
storage facility in which more data can be stored than on the mobile device alone.
Partition data stored remotely from the device may be accessed when a partition is
accessed, preferably using the same security steps as for checking access to the
partition on the device, i.e. based on the data specifying the partition and an
20 identification code of an identification module associated with the device. Thus, the
data in the cloud would only be accessible via the correct mobile device since the
identification code from the SIM card or hardware of the device would be required in
order to gain access.
A user could set on the device what types of content would fall in the
25 category of only being available in the partition they were obtained in. Other types
of content (e.g. emails) could, for example, be accessible in other or any partitions
on the device.
Once a partition has been accessed, all audit trails and activity may be kept
discretely within the partition. This could include browsing history, call lists and
30 address book, for example.
The term "mobile communications device" includes devices such as mobile
telephones (cell phones), wireless PDAs, mobile tablet devices, phablets,
televisions, laptop computers (e.g. comprising a SIM card) and generally any device
that is capable of communicating wirelessly, e.g. via a wireless (wifi) network and/or
35 via a mobile telephone network.
The present invention can enable a user to partition different aspects of their
life such as work, home, school, travel, etc., where only certain information is
viewable in each partition. Thus, multiple data, each specifying a partition, may be
used in conjunction with a SIM or hardware or other identification module identifier
5 to gain access to different partitions on a mobile device. Such an arrangement
allows ease of use, security and the convergence of multiple lifestyle needs within a
single device.
In the present invention a user name (UID) is not needed. The present
invention is designed for a single user, which means the system can make use of
10 smart object technology in the SIM or other identification module, if all the identities
and security algorithms link to the SIM or other identification module, in order to
provide security to the system, as the device has partitions rather than separate or
discrete identities created on it, and therefore a two factor authentication can be
used to allow entry at every point. If the SIM or other identification module is used
15 as the control point, no UID needs to be entered, just data specifying a partition.
If the system were for multiple users this would require user names (Unique
Identifiers), such as JBloggs or ASmith, to be entered and this would be impossible
if the device were locked. If an input screen were to be created it would also be
difficult to undertake on a regular basis. This would essentially render the service
20 either unusable or insecure. However, since the present invention is for a single
user and does not require user names, these problems are not present.
Preferably, access to and management of the partitions (e.g. mapping) are
controlled by the SIM or other identification module associated with the mobile
communication device. Ideally, the SIM card (or other identification module) checks
25 the passcode(s) entered to access the different partitions and allows or denies
access to the various partitions based, at least in part, on the entered passcode.
Such a system provides greater security than known systems in which partition
access and mapping are controlled by an application in the mobile and not in the
SIM or other secure element.
30 Preferably, a mapping table mapping passcodes to their respective
partitions is stored in the SIM or other identification module associated with the
mobile communication device. This helps the SIM or other identification module be
able to control access to the different partitions securely.
In a preferred process, a SIM or other identification module receives data
35 specifying a partition (e.g. a passcode). The SIM or other identification module then
preferably verifies the data specifying a partition and creates a certificate, based on
the result of that verification. The certificate is preferably generated based on, e.g.
by performing an algorithm on, the data specifying a partition (e.g. a passcode) and
identification data (e.g. an identifier) of the SIM card or other identification module.
5 The certificate is then preferably transmitted via a secure channel to a processor in
the device, via which access to the partitions is controlled.
As explained above, the user may select what data (e.g. which photos,
videos, internet browsing history, call logs, internet passwords/usernames etc.) is
available in each partition. The partitions may have separate and/or common
10 content, applications, services etc. Thus, a user could select, for example, what
media or other content they want to be available in different parts of their life.
Moreover, the invention allows a user to use a single device for both home and
work purposes, for example, without compromising their workllife integrity.
The selection of what content andlor functionality is available in each
15 partition is preferably performed in an administrator partition (MEA), where the
content, settings (e.g, functionality) and identity of the other partitions can be set. A
user could use the administrator partition to select or de-select features of the
mobile device, such as those described below, to partition content and functionality
pertinent to the different partitions.
20 For example, a user could:
have separate and different address lists in each partition . have separate and different browsing histories in each partition
have separate and different photos and videos in each partition
have separate and different SMS and MMS records in each partition
have separate and different lists of calls to send straight to voicernail
in each partition
send SMS and MMS straight to folders in different partitions without
appearing in all partitions
synchronise or not synchronise different folders in different partitions
to a PC or a cloud
have separate and different call timers in each partition to aid in
corporate expenses and recharge . have separate, different but also complimentary apps in each
partition
have separate and different email accounts in each partition
turn onloff Bluetooth, SMS, voice or data services in each partition
not be able to see and content in other partition unless in the
administrator partition
have separate and different voicemail greetings in each partition
Of course, some content andlor functionality may be common or shared
between more than one partition.
The user preferably has access to all functionality and content in the MEA.
Within the MEA, the user may set up partitions' respective passcodes (see below),
10 for example.
If the user has accessed a particular partition and the device enters a
standby mode (e.g. after a certain predefined period of inactivity or following the
pressing of a "standby" key), the device will preferably standby in the partition mode
it was previously in (i.e. immediately before standby) and follow any conditional
15 formula which has been set up for activity of that partition in that mode. For
example, if the user is in a "home" partition, they could configure all calls except for
a group called family to be sent directly to voicemail. They could also do the same
for all SMS messages received except for the family group again. Any digital
content (e.g. media such as audio, images andlor video) which arrives could be
20 sent to the administrator partition, which could either hold or re-file that content
based on pre-defined rules to another partition set up by the user.
Preferably, the identification code is received from and may correspond to or
be based on a SIM card in the device. This provides security because if the SIM
card is removed from the device all the content on the device is locked as it is no
25 longer possible for someone to enter a partition; the identification code from the
SIM is required in order for access to the partition to be allowed. The user is
secured because if the SIM is removed or remotely deactivated, the verification
process will no longer work due to lack of one of its elements (the SIM identification
code), so the content is locked securely in the device. This would also be the case
30 if the partition content were stored in a cloud or another external memory device;
the lack of a SIM would prohibit access to any partition. Removal of the SIM would
lock all partition content and insertion of a new SIM would not unlock the content as
it would not have the correct identification code.
Preferably, the SIM is based on a JavaCard. This provides the possibility
35 for the SIM to manage different applets, one for each partition, with independent
security features. These applets could be used to control access to each of the
partitions on the device.
In one preferred embodiment, the data specifying a partition comprises a
passcode for the specified partition. The passcodes for the partitions may each
5 comprise letters andlor numbers and are preferably 1-9 digits long, more preferably
3 or 4 digits long. Preferably, they are solely numeric passcodes. The passcodes
for different partitions may have the same or differing lengths.
With the present invention, entry into a selected partition may therefore be
allowed or denied based on both a passcode for a partition and an identification
10 code from a SIM or hardware of the device. For example, both the passcode and
the identification code could have to match those stored in the device for the
selected partition for access to the selected partition to be allowed.
However, preferably, the identification code or identification data (from a
SIM card or hardware or other identification module in or associated with the
15 device) and the passcode are passed through an algorithm to create a certificate or
hash. Preferably, the algorithm comprises an encryption algorithm such as a PKI
(public key infrastructure) algorithm, for example. The certificate or hash may then
be compared with a predefined certificate or hash for the selected partition (see
below for a description of a preferred form of this) and, if the two certificates or
20 hashes match, access to the selected partition can be allowed. This provides a
secure system because user authentication can be verified at each point. This
means that network services and audit trails can be used with full integrity. A mobile
phone carrier, for example, can be confident that a user is the lawful and contracted
user of the device who is financially and legally responsible for all activity
25 undertaken with the device.
Preferably, once a certificate or hash has been created, both the certificate
or hash and the SIM or hardware or other identification module identifier are passed
to a verification module which decrypts the certificate or hash to provide the
passcode for the partition and passes the user to the partition they were seeking to
30 access, providing entry is allowed. Entry is allowed if the certificate or hash
corresponds to a predefined certificate or hash for the partition.
The passcode is preferably entered by a user of the device. A user could
enter the passcode by touching on a touch-sensitive screen or a keypad of the
device, for example.
Alternatively, the data specifying a partition could be received from a signalemitting
device. Preferably, the data is received wirelessly. The signal-emitting
device could be a NFC (near field communication) tag, for example. In this way, a
user may access a partition on their device by, for example, holding their device by
5 a NFC tag for a selected partition. For example, a user could have a tag at home, a
tag at work, a tag in the car, etc. When a user moves to a different part of their life
(e.g. home, work, car) they can receive a signal from the relevant tag and their
device will automatically access the relevant partition based on their location.
The tags or other signal-emitting devices may be used as environment
10 descriptors. Preferably, a signal-emitting device contains an encrypted version of a
passcode or a hash representing the passcode, which it can transmit wirelessly to a
mobile device held near the signal-emitting device. Preferably, the signal-emitting
device also contains a unique ID corresponding to that signal-emitting device. The
signal-emitting device could also contain information relating to its environment
15 such as a "post iP' (information) from other people in the environment. This
information could then be transmitted from the signal-emitting device to a mobile
device.
As an alternative to using NFC tags (which not all mobile communication
devices may be able to read), Flashcode could be used to implement a similar
20 system. However, this might reduce security and some features such as the "postit"
provision might not be possible. For these reasons, NFC tags are preferred to a
Flashcode-based system.
A passcode could be required to be entered by the user to switch the device
into an NFC or Flashcode tag controlled mode, where partitions may be accessed
25 based on an NFC or Flashcode signal received by the device. Requiring a
passcode in this way could reduce the potential security risk associated with using
Flashcode, or even with NFC tags on which the security may be limited for cost
reasons.
The data specifying a partition could, for example, comprise data specifying
30 the content andlor functionality available in that partition instead of or in addition to
a passcode for that partition. in this way, a new partition could, for example, be setup
on a device with a specified configuration. This could be useful, for example, in
a cinema, hospital or library, where a device could receive a signal (e.g. from a
NFC tag) causing it to enter a "cinema" partition where vibrate is turned off and the
35 ring volume is set to "silent".
The NFC tags, or other signal-emitting devices, could be set-up to contain
the information specifying a partition before they are sold to a user. For example, a
number of pre-defined partitions could be provided on respective signal-emitting
devices with settings appropriate for "home", "car" and "office" use. Alternatively, or
5 additionally, a user could set up their own signal-emitting devices with information
specifying partitions by coupling the signal-emitting devices to their computer. The
information provided to the signal-emitting devices from the computer could be
defined by the user themselves or it could be information downloaded from the
internet specifying a pre-defined partition that a user might wish to use.
10 In an alternative embodiment, the data specifying a partition could comprise
data specifying a path to data on a cloud or server where details of the partition are
located. These details could comprise data specifying the content andlor
functionality of the partition, for example. The path specified by the data is
preferably a unique and secure path.
15 Preferably, the first time a communication device receives a signal from a
signal-emitting device specifying a path for a particular partition, as described
above, the communication device sends a signal to the cloud or server specified by
that path and, in response, receives data from the cloud or server specifying a
partition (i.e. its content andlor functionality). The partition (e.g. its functionality and.
20 optionally, its content) may then be saved on the communication device. The
content need not necessarily be stored on the communication device itself. It could,
for example, be stored remotely, for example in a cloud or server, and then
accessed when required by the user of the device.
The next time the communication device receives a signal from the same (or
25 another) signal-emitting device to enter that partition, the communication device
may enter that partition based on the data specifying that partition that is already
saved on the mobile communication device. There would be no need for the
communication device to send and receive a signal from the cloud or server as the
device would already contain the data required to access the specified partition.
30 In one example, the user or another person (e.g. a controller of the partition,
in the case of a partition which may be accessed by more than one
user/communication device) may update the data specifying the partition (e.g. its
content and/or functionality) that is stored in the cloud or server. Then, when a
communication device receives a signal from a signal emitting device to access that
35 partition, preferably that signal also contains data specifying that the partition has
been updated and, even if the device already has the partition (before the update)
stored thereon, it preferably sends a signal to the cloud or server specified by the
path and, in response, receives data specifying the updated partition (e.g. its
content andlor functionality) which is then accessed on the communication device.
5 The updated partition may then be stored on the communication device.
The partitions specified by the signal-emitting devices could be "open" or
"closed".
If a signal-emitting device emits information specifying a partition that is
deemed to be "open", this would mean that a mobile communication device user
10 could receive that signal and then access the specified partition on their device.
This could be useful in public spaces such as cinemas and hospitals, for example.
In contrast with this, when a signal-emitting devices emits information
specifying a partition that is deemed to be "closed", this would mean that a mobile
communication device user might have to enter a code or password before their
15 device could enter the specified partition. In this way, only users in possession of
the correct code or password could enter closed partitions on their device. This
could be useful in spaces such as schools or corporations where only certain
people would wish to, or would be wished to be allowed to, access a particular
partition.
20 In order to switch between the partitions on a device, preferably the user
"locks" the device such that the device leaves its current partition. The user may
then access a different (or the previous) partition by entering the passcode for that
partition or by holding the device on or near a signal-emitting device, for example.
The input passcode is then preferably passed to the entry application, as described
25 above, and if entry is allowed, the device then enters the selected partition.
Alternatively, a user may switch between partitions without first having to
lock their device.
Content of a particular partition may be encrypted. The content could be
stored in the partition on the mobile device or it could be stored elsewhere, for
30 example in a cloud or server, which is accessible when a user accesses the
partition on their mobile device. If the content is encrypted, the method of
accessing a partition preferably comprises decrypting any encrypted content of that
partition (wherever that content is stored). The encryption and decryption of the
content could be based on the passcode for the partition andlor the identification
35 code for the SIM or hardware in the device, for example. The encryptionldecryption
of the content could therefore be based on the same encryption algorithms as those
used to create a hash, for example.
In some embodiments, it might not be desirable for the content to be
encrypted.
5 In a preferred embodiment of the invention, a single user is considered with
a single unique SIM card inserted into the SIM slot of hislher mobile communication
device. All of the secrets and partition allocations are ideally under the control of
this one unique SIM. The SIM is ideally the safe box for all of the secrets (e.g. the
identification code of the SIM or other hardware or secure element of the device).
10 Preferably, when appropriate passcodes are sent from the SIM, authorization
certificates are provided through a secure channel to a main processor in the
mobile communication device which manages the access to the different partitions.
Passcode verification is ideally done in the SIM by a secure processor of the SIM.
The security features of the SIM smart card allow it to create a secure channel with
15 the main processor in the mobile communication device to ensure confidentiality of
the authorization certificates which are sent to open the targeted partitions.
In some embodiments, different telephone numbers may be associated with
different partitions on or associated with a single communication device. These
may be domestic or international numbers, for example. Thus, messages sent to a
20 particular telephone number can be automatically stored in the partition with the
telephone number to which they were sent. The partition could be on the device or
in the cloud or a remote server, for example. Messages sent and calls made from a
particular partition (i.e. the device is in that partition) could automatically be sent
from the telephone number associated with that partition so that replieslresponses
25 to such messages or calls would be directed back to the same telephone number
and partition.
In some embodiments, the device or a partition on the device may be
configured such that the device automatically switches to a different partition at a
predefined time. For example, when a device is in a "school" or "work" partition, it
30 could be set to automatically enter a different partition (e.g. a "home" partition) at a
time corresponding to the end of the school-day or work-day. The device could
then automatically re-enter the "school" or "work" partition at the start of the next
school-day or work-day. The device may also be configured to switch to different
partitions at different times during the school-day or work-day (e.g. break or lunch
35 times). In these partitions, the user could, for example, be allowed access to the
lnternet andlor email andlor SMS messages, which might be denied at other times
during the school-day or work-day, when in the "school" or "work" partition.
Alternatively or additionally, a partition may be configured to adjust its
settings automatically at certain times. For example, when in a "school" or "work"
5 partition a user could, for example, be allowed access to the lnternet andlor email
andlor SMS messages, which might be denied at other times during the school-day
or work-day.
Settings to automatically switch partitions and/or change the
functionalitylsettings of a partition at predefined times could be transmitted to a
10 device when entering a partition (e.g. a "school" or "work" partition) for the first time,
for example when tapping on a signal-emitting device such as an NFC tag for the
first time. The user would then not have to re-tap on the signal-emitting device
each time they wanted to enter that partition. Rather, their device would be
configured to leave and re-enter that partition automatically at pre-defined times.
15 The pre-defined times could be set by an administrator of the "school" or "work"
partition, which could be some one other than the user of the mobile communication
device.
According to a second aspect, there is provided a mobile communication
device comprising a partition entry module, wherein the partition entry module is
20 arranged to: receive data specifying a partition; receive an identification code from a
identification module associated with the device; determine, based on both the data
specifying a partition and the identification code, whether access to the specified
partition is to be allowed; and allow or deny access to the specified partition
accordingly.
25 The identification module could be or comprise a removable identification
module, a remote identification module, a SIM card, hardware, a secure element, a
trusted execution environment (TEE), or a software SIM, for example. The
identification module could be provided in the device or remotely.
As with the first aspect, preferably the identification code is received from
30 and corresponds to or is based on the SIM card or other identification module
associated with or provided in the device.
The partition entry module is preferably stored in a memory in the device's
hardware.
The data specifying a partition may comprise a passcode for the specified
35 partition.
The SIM card or other identification module islare preferably arranged to
verify the data specifying a partition and the identification code to determine
whether access to the specified partition is to be allowed.
The SIM card or other identification module islare preferably arranged to
5 generate the identification code based on the data specifying a partition.
The identification code may be a certificate generated from identification
data of the SIM card or other identification module
The SIM card or other identification module is preferably arranged to send
the identification code to open the specified partition when access to the specified
10 partition is allowed.
The device may be arranged to send or display a message indicating that
access to the specified partition is not allowed when access to the specified
partition is not allowed.
The SIM card or other identification module is preferably arranged to send
15 the data specifying a partition and the identification code to a partition entry module
when access to the specified partition is allowed. In this case, the SIM card or
other identification module is ideally arranged to send the data specifying a partition
and the identification code to a partition entry module via a secure channel. The
secure channel may be created by a mutual authentication process between the
20 SIM card or other identification module and the partition entry module, for example.
The device may comprise means for encrypting the data specifying a partition
andlor the identification code before sending them to the partition entry module.
The device may comprise keys and/or a touch-sensitive screen, and the
partition entry module may be arranged to receive the passcode when a user
25 presses the keys andlor the touch-sensitive screen so as to enter the passcode.
Preferably, the partition entry module andlor SIM card or other identification
module comprises a hash creation module and the hash creation module is
arranged to pass the identification code and the passcode through an algorithm to
create a hash. The algorithm preferably comprises an encryption algorithm, which
30 is preferably a PKI encryption algorithm.
The partition entry module preferably comprises a verification module
arranged to compare the hash with a predefined hash for the partition, and to allow
access to the partition if the two hashes match.
The device may comprise a receiver arranged to receive data specifying a
35 partition from a signal-emitting device. Preferably, the data from the signal-emitting
device is received wirelessly. The signal-emitting device could comprise a NFC
tag, for example.
Content of a particular partition may be encrypted for security reasons.
Therefore, the device may comprise decryption means for decrypting any encrypted
5 content of an accessed partition.
According to a third aspect, there is provided a method of creating a
partition on a mobile communication device, the method comprising: inputting a
passcode for the partition; and setting what content andlor functionality is available
in the partition. According to this aspect, a user may, for example, set up a partition
10 on their device and specify what content and configurationlfunctionality they wish
that partition to have. Thus, they could, for example, set up partitions with content
and functionality tailored to different aspects of their life.
The method may comprise inputting a name or identifier for the partition, so
that it can quickly and easily be identified by a user (e.g. "home", "work", etc.).
15 Preferably, the method comprises passing the passcode through an
algorithm to create a hash. This hash may then act as a predefined hash for the
partition which can be checked against a further hash when access to the partition
is later sought. Preferably, the method also comprises passing an identification
code or identification data from a SIM card or hardware or other identification
20 module in or associated with the device through the algorithm with the passcode to
create the hash. Preferably, the algorithm comprises an encryption. algorithm,
which is preferably a PKI encryption algorithm. This makes the hash more secure.
The hash may be stored in the device, for example. Alternatively or additionally it
may be stored remotely, such as in a cloud or an external memory device.
25 The method may further comprise encrypting the content that is available in
the partition. This provides further security to a user. Preferably, a passcode
and/or an identification code or identification data from a SIM card or hardware or
other identification module in or associated with the device would be used to
encrypt the content. The method may comprise decrypting the content when the
30 partition is accessed.
The method preferably comprises storing the passcode for the partition in a
SIM card or other identification module of the device.
The method preferably comprises receiving identification data from a SIM
card or other identification module of the device and generating an identification
35 code for the partition based on the passcode and the identification data. In this
case, the method may further comprise storing the identification code in the device,
preferably in a mapping table for the partitions in the device.
According to a fourth aspect, there is provided a mobile communication
device comprising a partition creation module, the partition creation module being
5 arranged to: receive a passcode for a partition to be created; create a partition on
the device corresponding to that passcode; and set what content andlor
functionality is available in that partition.
The partition creation module may be further arranged to receive a name or
identifier for the partition.
10 Preferably, the partition creation module is arranged to pass the passcode
through an algorithm to create a hash. Preferably, the partition creation module is
further arranged to pass an identification code or identification data from a SIM card
or hardware or other identification module in the device through the algorithm with
the passcode to create the hash. Preferably, the algorithm comprises an encryption
15 algorithm, which is preferably a PKI encryption algorithm.
The partition creation module may be arranged to store the hash in the
device.
Alternatively or additionally, the partition creation module may be arranged
to store the hash remotely, preferably in a cloud or an external memory device.
20 The device preferably comprises an administrator partition and the partition
creation module is only accessible or operable when in the administrator partition.
Thus, preferably, a user must be in the administrator partition in order to create,
modify and control partitions on their device. The administrator partition could be
stored on the mobile device or it could be stored in a cloud or external hardware
25 device to be accessed locally or wirelessly.
The content that is accessible in a partition may be encrypted. The device
may therefore comprise decryption means arranged to decrypt the encrypted
content of a partition when a user accesses that partition.
The passcode for the partition is preferably stored in a SIM card or other
30 identification module of the device.
The partition creation module is preferably provided in the SIM card or other
identification module of the device.
According to a fifth aspect, there is provided a system comprising a mobile
communication device and at least one signal-emitting device, wherein the devices
35 are arranged such that when the mobile communication device receives a signal
from a signal-emitting device specifying a partition, the mobile communication
device accesses the partition specified by that signal. Thus, signal-emitting devices
may be used to make a mobile communication device enter a specified partition
and there is not necessarily any need for a user to interact with their device (e.g. by
5 pressing keys or a touch-sensitive screen).
Preferably, the at least one signal-emitting device emits signals wirelessly.
It could comprise a NFC tag, for example.
The signal specifying a partition may comprise a passcode for that partition.
Alternatively or additionally, the signal specifying a partition may comprise
10 information specifying what functionality the mobile communication device will have
in that partition andlor what content will be available. Thus, a signal from a signalemitting
device may be used to cause a mobile device to enter a partition where the
functionality of that partition andlor the content accessible when in that partition is
specified in the signal received from the signal-emitting device. In this case, the
15 signal from a signal-emitting device could cause the partition to first be created on
the mobile device and then cause the mobile device to enter that partition. This
could happen automatically when a mobile device receives a signal from a signalemitting
device or a user could be required to enter a code or password for the
partition before a new partition can be created. Once the partition has been created
20 for the first time, if a user receives a further signal to enter that partition this could
then happen automatically, for example, without requiring the user to enter the code
or password again. Alternatively, a user could be required to enter a code or
password for the partition each time their mobile device receives a signal to enter it.
The fifth aspect of the invention also extends to a signal-emitting device (or
25 transmitter) arranged to send a signal specifying a partition to a mobile
communication device such that when the mobile communication device receives
the signal the mobile communication device accesses the partition specified by that
signal.
According to a sixth aspect, there is provided a method of accessing a
30 partition on a mobile communication device, the method comprising: receiving a
signal from a signal-emitting device, the signal comprising information specifying a
partition on a mobile communication device; and accessing that partition based on
the received signal. Thus, as with the previous aspect, signal-emitting devices may
be used to make a mobile communication device access a partition and there is not
necessarily any need for a user to interact with their device (e.g. by pressing keys
or a touch-sensitive screen).
The signal specifying a partition may comprise a passcode for the partition.
The method may comprise accessing a partition on the device corresponding to the
5 received passcode.
The signal specifying a partition may comprise information specifying what
functionality the mobile communication device will have and/or what content will be
available when that partition is accessed. Thus, as with the previous aspect, a
signal from a signal-emitting device may be used to cause a mobile device to enter
10 a partition where the functionality and/or content of that partition is specified in the
signal received from the signal-emitting device.
Preferably, the signal-emitting device emits signals wirelessly. It could
comprise an NFC tag, for example.
According to a seventh aspect, there is provided a mobile communication
15 device comprising: a receiver for receiving a signal comprising information
specifying a partition on a mobile communication device; and partition access
means for accessing a partition based on the received signal.
The receiver may be arranged to receive a passcode for a partition and the
partition access means may be arranged to access the partition that corresponds to
20 the received passcode.
The partition access means may be arranged to create a partition based on
partition configuration information contained in the received signal, and to then
access that partition.
Preferably, the receiver is arranged to receive a signal wirelessly, such as a
25 signal from a NFC tag, for example.
According to an eighth aspect, there is provided a method of accessing a
partition on a mobile communication device comprising selecting a partition from a
list of available partitions displayed on the device, and then accessing the selected
partition. Thus, a user may simply and easily access a partition on their device by
30 selecting a partition from a list of available partitions displayed on the device.
The partitions may have predefined accessible content andlor functionality
such as the content and functionality described above.
The list of available partitions may comprise a list of partition names.
Alternatively or additionally, the list of available partitions may comprise a
35 list or array of images representing the respective partitions.
The method preferably comprises the user touching keys and/or a touchsensitive
screen of the device in order to select a partition from the list.
In a preferred embodiment, after a partition has been selected, a user must
enter a passcode for that partition before the partition can be accessed. This
5 provides security since a person must know the passcode for a partition in order to
be able to enter it.
According to a ninth aspect, there is provided a mobile communication
device comprising at least two partitions and a partition access module, wherein the
partition access module is arranged to: cause a screen on the mobile
10 communication device to display a list of available partitions; receive data
specifying a partition selected from that list; and allow access to the selected
partition.
Preferably, the partition access module is arranged to only allow access to a
selected partition if it receives a correct passcode for that partition.
15 According to a tenth aspect, there is provided a computer program for
accessing a partition on a mobile communication device, the program being
configured to perform the following steps when executed on a mobile
communication device: receive data specifying a partition; receive an identification
code from a SIM card or hardware in the device; determine, based on both the data
20 specifying a partition and the identification code, whether access to the specified
partition is to be allowed; and allow or deny access to the specified partition
accordingly.
According to an eleventh aspect, there is provided a computer program for
creating a partition on a mobile communication device, the program being
25 configured to perform the following steps when executed on a mobile
communication device: receive a passcode for the partition; and set what content
andlor functionality is available in the partition.
According to a twelfth aspect, there is provided a computer program for
accessing a partition on a mobile communication device, the program being
30 configured to perform the following steps when executed on a mobile
communication device: receive a signal from a signal-emitting device, the signal
comprising information specifying a partition on a mobile communication device;
allow access to that partition based on the received signal.
According to a thirteenth aspect, there is provided a computer program for
35 accessing a partition on a mobile communication device, the program being
configured to perform the following steps when executed on a mobile
communication device: display a list of available partitions on a screen of the mobile
communication device; receive information corresponding to a partition selected
from that list; and allow access to the selected partition.
5 According to a fourteenth aspect, there is provided a computer readable
medium with a computer program according to any of the tenth to thirteenth aspects
of the invention stored thereon.
The various aspects of the invention may comprise any of the optional or
preferred features of the other aspects of the invention. In order to avoid repetition,
10 not all of the optional or preferred features have been described under each aspect
of the invention.
The various aspects of the present invention have a number of possible
applications. They could be of particular benefit, for example, when used in places
such as cinemas, libraries, hospitals and schools. For example, a public NFC tag
15 (i.e. a tag emitting a signal specifying a partition which anyone is free to access on
their mobile device, without having to enter a code or password into their device)
could be located at a cinema. Before customers at a cinema watch a film, they
could hold their mobile device near the tag and a signal would be sent from the tag
to the device causing the phone to enter a "cinema" partition, where, for example,
20 the device's volume is set to "silent" and vibrate is turned off. Calls could, for
example, be sent straight to voicemail.
Preferred embodiments of the invention will now be described by way of
example only and with reference to the accompanying drawings in which:
Fig. 1 shows an embodiment of the basic security architecture on a mobile
25 phone;
Fig. 2 shows a schematic diagram of an embodiment of the basic security
architecture on a mobile phone with NFC communication;
Fig. 3 is an illustration of an embodiment using NFC tags; and
Fig. 4 is an illustration of an embodiment where partition data is stored in a
30 cloud.
Fig. 1 shows a preferred embodiment of the basic architecture of a mobile
phone with n partitions (domains).
The SIM card is a JavaCard with n applets, one for each partition. Applet 0
is labelled "Master key" and is the applet for the "Administrator partition" described
35 above, from which all the other partitions can be managed.
The phone also has a main processor where encryption and decryption are
performed and access to a partition is checked and allowed or denied.
The data partition memory of the mobile phone is divided into n partitions.
Access to each partition is controlled by an applet inside the SIM module. An
5 applet is provided for each partition. The main function of each applet n is to
control access to the partition n and to provide the appropriate key to the main
processor to perform encryptionldecryption of the data on the respective partition.
Access to each partition is protected by the SIM. A user must enter the
correct passcode to access a given partition and for the encrypted data inside that
10 partition to be decrypted.
When a user wishes to enter a particular partition then enter the passcode
or PIN for that partition by typing on the keypad or touch-sensitive screen of the
mobile phone. The entered passcode is then passed to the SIM where it is
received by the corresponding applet and passed through a PKI encryption
algorithm combining it with the SIM identifier to create a hash
This is illustrated in the following table:
The hash is then passed to a main processor on the mobile phone where it
is decrypted to extract the PIN and identify which partition the user is seeking to
20 access. Then, if the hash correspond to a hash already stored in the phone's
memory for that partition (or stored remotely, such as in a cloud or external memory
storage device), access to the requested partition is allowed and the phone enters
that partition.
The content accessible in each partition is encrypted, so when access to a
25 particular partition is allowed, the content of that partition is decrypted using the
passcode for the partition and SIM identifier. The content is stored in a database
which is either stored in the device itself or remotely, such as in a cloud or internal
hardware device. Separate data domains or a single database with partition flags
could be used. The flags in such a database can indicate which data is accessible
to which partition.
When a partition has been entered and its content decrypted, the content
can be viewed on the phone's screen and the phone has the configuration or set-up
5 (functionality) corresponding to that partition.
As the data are encrypted, a direct access to the memory will deliver
encrypted data. So no sensitive information will be available by these means.
The SIM module is based on a JavaCard. This offers the possibility to
manage different applets with independent security features. If the SIM used for
10 this function is also the phone operator SIM, the master key of the SIM will allow
controlling the SIM and the telecom connection with a master PIN. This means that
first the SIM needs to be unlocked before one of the encrypted partitions can be
unlocked (as is the case in a basic mobile phone).
On the other hand, if the SIM used for partition memory partitioning control
15 is not the operator SIM but a second secure element in the phone, a master key is
not needed.
In order to manage the content and functionality of each partition, a user has
to enter the administrator or master partition. From here, all the other partitions can
be managed and the user can set what content is visible and what functionality is
20 available as well as other phone settings such as volume, vibrate and call divert.
When, for example, a photo or video is taken with a camera in the phone,
that photo or video is automatically accessible when in the partition in which the
phone was when the photo or video was taken. As a default setting, it is not
available in any other partitions except the administrator partition. If a user wants to
25 make that photo or video available in a different or other partitions, helshe can
manage this in the administrator partition.
The domains I-n could be data keys which specify data flags held in a
single database against content or functionality.
Fig. 2 shows an embodiment of the architecture of a mobile phone with n
30 partitions (domains) which is configured to access the partitions using NFC tags.
This embodiment is similar to that of Fig. 1 except that the phone
additionally comprises an NFC front end which can send signals to NFC tags and
receive signals from NFC tags.
This embodiment works in the same way as that of Fig. 1 except that the
passcode for a particular partition is received from an NFC tag, rather than being
input by a user.
In addition, the phone can receive a signal from an NFC tag instructing it to
5 set up and enter a new partition on the phone with a configuration defined in the
signal received from the tag. Alternatively, the signal could comprise a unique and
secure path to data specifying a partition stored on a server or in a cloud, which the
phone accesses after it has received the path from the NFC tag. If the tag sends a
signal to enter an "open" partition, then the phone enters that partition
10 automatically. However, if the tag sends a signal to enter a "closed" partition, then
the user has to enter the correct code or password for the partition before they can
enter it on their phone.
In one example, when the phone of Fig. 2 is held near an NFC tag, the
following steps are performed:
15 the phone receives a signal from the tag, the signal containing data
comprising a passcode for a partition and also identification
information relating to the tag
thepasscode is extracted from the received signal by a specific
applet provided in the SIM card of the device
the environmenfflocation is determined from the received signal
either from a certificate or encrypted passcode contained in the
signal, or from the identification information relating to the tag
additional information (such as a "post-it" containing information form
previous users of the tag) can also be received from the tag . the tag is updated by updating a certificate if, for security reasons, it
is valid just for one sessionluse, andlor by erasing any additional
information such as a "post-it" if it has been downloaded into the
mobile device
Fig. 3 shows a mobile phone in communication with an "Office desk" tag,
30 where the phone has entered the "Office desk" partition with the set-up shown in
the figure. In this case, the tag simply sent the phone a passcode to enter the
"Office desk" partition, which already existed on the mobile phone.
A specific application of the present invention will now be described.
In schools, a big problem can be how to control the use of mobile phones
35 (or other mobile communication devices) to protect children against spam or
SMSIMMS messages in the classroom, which could disrupt lessons, to avoid the
use of such devices during exams, and to filterlcontrol internet access such that
certain, e.g. undesirable, websites are not accessible.
By using the present invention, pupils can configure their mobile phones to
5 enter a commonly agreed mode (or partition) when they enter the school premises
or a classroom by holding their phones next to an NFC tag sending a signal for the
phone to enter a "school" partition whose configuration (i.e. accessible content and
available functionality) is set by the school. For example, a pupil's phone could
switch between the following partitions during a school day:
10 At home - device is in "home" partition where:
SMSlMMS : allowed
Phone directorylcontacts : fully accessible
Accessible content : "home" data
lnternet access : freely allowed or under parental control
15 At school - device is held by an NFC tag such that it enters a "school" partition
where: . SMSIMMS : blocked . Phone directorylcontacts : only parentsldoctorlurgent contact
accessible
Accessible content: "school" data with free access such that
teachers can control this content
lnternet access : blocked or filtered such that only certain websites
can be viewed
In an exam room - device is held by an NFC tag such that it enters an "exam"
25 partition where:
SMSIMMS : blocked
Phone directory : only parentsldoctor lurgency . Data partition : Blocked
lnternet access : Blocked
The "school" partition (or any other partition) could have time-dependent
functionality. For example, SMSIMMSIcall functionality could be available only at
certain pre-defined times of the day, corresponding to break and lunch times, for
example. At other times, SMSlMMSlcall functionality could be disabled or only
allowed to a specified list of "emergency" numbers (e.g. home, parents, carer).
Fig. 4 illustrates an embodiment where partition data is stored remotely in a
cloud accessed via a modem.
5 Here, the same data partitions are provided on the cloud as on the mobile
phone. This means that data stored in partitions on a mobile phone are replicated
on a cloud and can be retrieved from the cloud in the case, for example, that the
mobile phone is lost or stolen.
As well as providing a replication of partition data, the cloud provides data
10 banks which can store more (additional) data than is stored or storable on the
mobile device with its limited memory size. The additional data that is stored in the
cloud, but not on the mobile, can be downloaded to the mobile phone in each
respective partition when required by a user.
The security of the partitions in the cloud is managed the same way as on
15 the mobile phone and is based on the same encryption and preferably also on the
same passcodes to access the encrypted areas. This means that the access to the
encrypted area of a given partition on the cloud is managed from the SIM of the
mobile phone.
The process is as follows: when the mobile phone is connected to the cloud,
20 a mutual authentication process is managed between the mobile phone SIM and
the SAM or virtual SAM on the Cloud server. Then, if the correct PIN N is entered
into the mobile phone, access will be granted both to the partition N inside the
mobile phone memory and to partition N inside the cloud. This allows, for example.
synchronisation between the partition on the mobile phone and the corresponding
25 partition on the cloud (or synchronisation of particular areas of the partitions). Data
transfer can be performed securely via a secure data channel created following a
successful mutual authentication process.
A Trusted Services Manager (TSM) can be used to manage this process
securely.
30 A TSM is an Over The Air (OTA) trusted service which controls the
management of secure elements, keys and applications for mobile phones. An
NFC mobile phone based on a JavaCard SIM makes it possible to download
cardlets securely and the associated security elements Over the Air.
A TSM system could include, for example, the capability to perform the following
35 steps:
Step Customer experience
The mobile phone userlcustomer triggers
Service with a single click on their phone the
enrollment downloading of NFC applications onto the
phone
Customer uses their phone to pay: it is fast,
Payment convenient and it fits the modern lifestyle
Customer uses phone for transit Transit over the air when the valuetr arunnsist alonwd top-up
Customer accesses customized information
Rewards and personalized offers through interactive
billboards
When customer loses their mobile phone,
NFC applications are immediately blocked
S'O'S OTA. The same applications can be easily
re-downloaded on a new device.
CASSlS solution
features
Auto-provisioning
platform . Download Manager
Application . Installation follow-
UP
Handset feedback
(push-registry) . Off-line counter
reset . Smart MlDlet . Mifare and Calypso
OTA provisioning . Top-up gateway for
OTA stored value
top-up . Tag reading user
interface
Customised tag
campaigns
management
Coupons
download, store &
redeem
mechanism . Over-The-Air
immediate blocking
Routing messages
to parties . Re-issuance
management
Life cycle
management
In the case of the present invention, TSM features can include the
downloading of specific applications to manage the environments related to each
partition. This means the keys and the access rights for each partition. A TSM will
handle also the NFC application which allows the automatic switching from one
5 partition to another when a mobile phone receives a signal from a NFC tag. A TSM
will also manage, over the air, the life cycle of the NFC mobile to support enrolment,
downloads, updates, lost devices, end of life.
Claims
1. A method of accessing a partition or switching between partitions on a
mobile communication device, the method comprising:
receiving data specifying a partition;
receiving an identification code from an identification module associated
with the device;
determining, based on both the data specifying a partition and the
identification code, whether access to the specified partition is to be allowed; and
allowing or denying access to the specified partition accordingly;
characterised in that the data specifying a partition comprises a passcode
for the specified partition;
the identification code corresponds to or is based on identification data of
the identification module; and
more than one passcode is associated with a single identification code.
2. A method as claimed in claim I, wherein the identification module is or
comprises a removable identification module, a remote identification module, a SIM
card, hardware, a secure element, a trusted execution environment, or a software
SIM.
3. A method as claimed in claim 1 or 2, wherein the data specifying a partition
and identification code are verified in the identification module and, based on this, it
is determined whether access to the specified partition is to be allowed.
4. A method as claimed in claim 1, 2 or 3, further comprising generating the
identification code in the identification module based on the data specifying a
partition.
5. A method as claimed in any preceding claim, wherein the identification code
is a certificate generated from identification data of the identification module.
6. A method as claimed in any preceding claim, wherein the identification code
is received from and corresponds to a SIM card in the device.
AMENDED SHEET
7. A method as claimed in any preceding claim, wherein the device comprises
keys andlor a touch-sensitive screen, and the passcode is received when a user
presses the keys andlor the touch-sensitive screen so as to enter the passcode.
8. A method as claimed in any preceding claim, wherein the identification code
is generated by passing the passcode through an algorithm to create a hash.
9. A method as claimed in claim 8, wherein the algorithm comprises an ' ,
encryption algorithm, preferably a PKI encryption algorithm.
10. A method as claimed in claim 8 or 9, wherein the hash is compared with a
predefined hash for the partition and access to the partition is allowed only if the
two hashes match.
11. A method as claimed in any preceding claim, wherein the data specifying a
partition is received from a signal-emitting device.
12. A method as claimed in claim I I , wherein the signal-emitting device
comprises a NFC tag.
13. A method as claimed in any preceding claim comprising decrypting any
encrypted content stored in the accessed partition.
14. A method as claimed in any preceding claim, further comprising sending the
identification code from the identification module to a partition entry module to open
the specified partition when access to the specified partition is allowed.
15. A method as claimed in any preceding claim, further comprising sending or
displaying a message indicating that access to the specified partition is not allowed
when access to the specified partition is not allowed.
16. A method as claimed in any preceding claim,, further comprising sending the
data specifying a partition and the identification code from the identification module
to a partition entry module when access to the specified partition is allowed.
AMENDED SHEET
17. A method as claimed in claim 16, wherein the data specifying a partition and
the identification code are sent from the identification module to a partition entry
module via a secure channel therebetween.
5 18. A method as claimed in claim 17, wherein the secure channel is created by
a mutual authentication process between the identification module and the partition
e n t j module.
19. A method as claimed in claim 16, 17 or 18, further comprising encrypting the
10 data specifying a partition and/or the identification code before sending them to the
partition entry module.
20. A method as claimed in any preceding claim, further comprising switching
partition automatically at a predefined time.
15
21. A method as claimed in any preceding claim, wherein different telephone
numbers are associated with different partitions on a single mobile communication
device.
20 22. A mobile communication device comprising a partition entry module,
wherein the partition entry module is arranged to:
receive data specifying a partition;
receive an identification code from an identification module associated with
the device;
25 determine, based on both the data specifying a partition and the
identification code, whether access to the specified partition is to be allowed; and
allow or deny access to the specified partition accordingly;
characterised in that the data specifying a partition comprises a passcode
for the specified partition;
30 the identification code corresponds to or is based on identification data of
the identification module; and
more than one passcode is associated with a single identification code.
23. A device as claimed in claim 22, wherein the identification module is or
35 comprises a removable identification module, a remote identification module, a SIM
AMENDED SHEET
card, hardware, a secure element, a trusted execution environment, or a software
SIM.
24. A device as claimed in claim 22 or 23, wherein the identification module is
5 arranged to verify the data specifying a partition and the identification code to
determine whether access to the specified partition is to be allowed.
25. A device as claimed in any of claims 22-24, wherein the identification
module is arranged to generate the identification wde based on the data specifying
10 a partition.
26. A device as claimed in any of claims 22-25, wherein the identification code
is a certificate generated from identification data of the identification module.
15 27. A device as claimed in any of claims 22-26, wherein the identification wde
is received from and corresponds to the SIM card in the device.
28 A device as claimed in any of claims 22-27, wherein the device comprises
keys andlor a touch-sensitive screen. and the partition entry module andlor
20 ~dentificationm odule is arranged to receive the passcode when a user presses the
keys andlor the touch-sensitive screen so as to enter the passcode.
29. A device as claimed in any of claims 22-28, wherein the partition entry
module andlor identification module comprises a hash creation module, the hash
25 creation module being arranged to pass the identification code and the passcode
through an algorithm to create a hash.
30. A device as claimed in claim 29, wherein the algorithm comprises an
encryption algorithm, preferably a PKI encryption algorithm.
30
31. A device as claimed in claim 29 or 30, wherein the partition entry module
comprises a verification module arranged to compare the hash with a predefined
hash for the partition, and to allow access to the partition if the two hashes match.
AMENDED SHEET
32. A device as claimed in any of claims 22 to 31, wherein the device comprises
a receiver arranged to receive data specifying a partition from a signal-emitting
device.
5 33. A device as claimed in claim 32, wherein the signal-emitting device
comprises a NFC tag.
34. A device as claimed in any of claims 22 to 33, wherein the device comprises
decryption means fordecrypting any encrypted content of an accessed partition.
10
35. A device as claimed in any of claims 22-34, wherein the identification
module is arranged to send the identification code to a partition entry module to
open the specified partition when access to the specified partition is allowed.
15 36. A device as claimed in any of claims 22-35, wherein the device is arranged
to send or display a message indicating that access to the specified partition is not
allowed when access to the specified partition is not allowed.
37. A device as claimed in any of claims 22-36, wherein the identification
20 module is arranged to send the data specifying a partition and the identification
code to a partition entry module when access to the specified partition is allowed.
38. A device as claimed in claim 37, wherein the identification module is
arranged to send the data specifying a partition and the identification code to a
25 partition entry module via a secure channel.
39. A device as claimed in claim 38, wherein the secure channel is created by a
mutual authentication process between the identification module and the partition
entry module.
30
40. A device as claimed in claim 37, 38 or 39, further comprising means for
encrypting the data specifying a partition andlor the identification code before
sending them to the partition entry module.
AMENDED SHEET
41. A computer program for accessing a partition on a mobile communication
device, the program being configured to cause the method of claim 1 to be
performed when executed on a mobile communication device.
receive data specifying a partition;
5
42. A computer readable medium with a computer program as defined in any of
claim 41 stored thereon.
| # | Name | Date |
|---|---|---|
| 1 | 7849-delnp-2014-Correspondence-Others-(25-09-2014).pdf | 2014-09-25 |
| 1 | 7849-DELNP-2014-IntimationOfGrant25-06-2021.pdf | 2021-06-25 |
| 2 | 7849-delnp-2014-Assignment-(25-09-2014).pdf | 2014-09-25 |
| 2 | 7849-DELNP-2014-PatentCertificate25-06-2021.pdf | 2021-06-25 |
| 3 | FORM 5.pdf | 2014-09-26 |
| 3 | 7849-DELNP-2014-FER_SER_REPLY [03-10-2019(online)].pdf | 2019-10-03 |
| 4 | FORM 3.pdf | 2014-09-26 |
| 4 | 7849-DELNP-2014-OTHERS [03-10-2019(online)].pdf | 2019-10-03 |
| 5 | Drawings.pdf | 2014-09-26 |
| 5 | 7849-DELNP-2014-ABSTRACT [27-09-2019(online)].pdf | 2019-09-27 |
| 6 | Complete Specification as published.pdf | 2014-09-26 |
| 6 | 7849-DELNP-2014-CLAIMS [27-09-2019(online)].pdf | 2019-09-27 |
| 7 | Abstract.pdf | 2014-09-26 |
| 7 | 7849-DELNP-2014-COMPLETE SPECIFICATION [27-09-2019(online)].pdf | 2019-09-27 |
| 8 | 7849-DELNP-2014.pdf | 2014-10-03 |
| 8 | 7849-DELNP-2014-DRAWING [27-09-2019(online)].pdf | 2019-09-27 |
| 9 | 7849-DELNP-2014-FER_SER_REPLY [27-09-2019(online)].pdf | 2019-09-27 |
| 9 | 7849-delnp-2014-GPA-(03-12-2014).pdf | 2014-12-03 |
| 10 | 7849-delnp-2014-Correspondence Others-(03-12-2014).pdf | 2014-12-03 |
| 10 | 7849-DELNP-2014-FORM 3 [27-09-2019(online)].pdf | 2019-09-27 |
| 11 | 7849-delnp-2014-Assignment-(03-12-2014).pdf | 2014-12-03 |
| 11 | 7849-DELNP-2014-Information under section 8(2) (MANDATORY) [27-09-2019(online)].pdf | 2019-09-27 |
| 12 | 7849-delnp-2014-Correspondence Others-(10-12-2014).pdf | 2014-12-10 |
| 12 | 7849-DELNP-2014-OTHERS [27-09-2019(online)].pdf | 2019-09-27 |
| 13 | 7849-delnp-2014-Assignment-(10-12-2014).pdf | 2014-12-10 |
| 13 | 7849-DELNP-2014-PETITION UNDER RULE 137 [27-09-2019(online)].pdf | 2019-09-27 |
| 14 | 7849-DELNP-2014-RELEVANT DOCUMENTS [27-09-2019(online)].pdf | 2019-09-27 |
| 14 | Power of Authority.pdf | 2014-12-11 |
| 15 | 7849-DELNP-2014-FORM 4(ii) [16-07-2019(online)].pdf | 2019-07-16 |
| 15 | Form 6 with cover letter and its enclosures.pdf | 2014-12-11 |
| 16 | 7849-DELNP-2014-Certified Copy of Priority Document (MANDATORY) [15-02-2019(online)].pdf | 2019-02-15 |
| 16 | Assignment document.pdf | 2014-12-11 |
| 17 | 7849-DELNP-2014-Power of Attorney-111214.pdf | 2014-12-19 |
| 17 | 7849-DELNP-2014-FER.pdf | 2019-01-30 |
| 18 | 7849-delnp-2014-Correspondence-others-(19-03-2015).pdf | 2015-03-19 |
| 18 | 7849-DELNP-2014-OTHERS-111214.pdf | 2014-12-19 |
| 19 | 7849-DELNP-2014-Form 2(Title Page)-111214.pdf | 2014-12-19 |
| 19 | 7849-delnp-2014-Form-3-(19-03-2015).pdf | 2015-03-19 |
| 20 | 7849-DELNP-2014-Correspondence-111214.pdf | 2014-12-19 |
| 20 | 7849-DELNP-2014-Form 1-111214.pdf | 2014-12-19 |
| 21 | 7849-DELNP-2014-Correspondence-111214.pdf | 2014-12-19 |
| 21 | 7849-DELNP-2014-Form 1-111214.pdf | 2014-12-19 |
| 22 | 7849-DELNP-2014-Form 2(Title Page)-111214.pdf | 2014-12-19 |
| 22 | 7849-delnp-2014-Form-3-(19-03-2015).pdf | 2015-03-19 |
| 23 | 7849-delnp-2014-Correspondence-others-(19-03-2015).pdf | 2015-03-19 |
| 23 | 7849-DELNP-2014-OTHERS-111214.pdf | 2014-12-19 |
| 24 | 7849-DELNP-2014-Power of Attorney-111214.pdf | 2014-12-19 |
| 24 | 7849-DELNP-2014-FER.pdf | 2019-01-30 |
| 25 | 7849-DELNP-2014-Certified Copy of Priority Document (MANDATORY) [15-02-2019(online)].pdf | 2019-02-15 |
| 25 | Assignment document.pdf | 2014-12-11 |
| 26 | 7849-DELNP-2014-FORM 4(ii) [16-07-2019(online)].pdf | 2019-07-16 |
| 26 | Form 6 with cover letter and its enclosures.pdf | 2014-12-11 |
| 27 | 7849-DELNP-2014-RELEVANT DOCUMENTS [27-09-2019(online)].pdf | 2019-09-27 |
| 27 | Power of Authority.pdf | 2014-12-11 |
| 28 | 7849-delnp-2014-Assignment-(10-12-2014).pdf | 2014-12-10 |
| 28 | 7849-DELNP-2014-PETITION UNDER RULE 137 [27-09-2019(online)].pdf | 2019-09-27 |
| 29 | 7849-delnp-2014-Correspondence Others-(10-12-2014).pdf | 2014-12-10 |
| 29 | 7849-DELNP-2014-OTHERS [27-09-2019(online)].pdf | 2019-09-27 |
| 30 | 7849-delnp-2014-Assignment-(03-12-2014).pdf | 2014-12-03 |
| 30 | 7849-DELNP-2014-Information under section 8(2) (MANDATORY) [27-09-2019(online)].pdf | 2019-09-27 |
| 31 | 7849-delnp-2014-Correspondence Others-(03-12-2014).pdf | 2014-12-03 |
| 31 | 7849-DELNP-2014-FORM 3 [27-09-2019(online)].pdf | 2019-09-27 |
| 32 | 7849-DELNP-2014-FER_SER_REPLY [27-09-2019(online)].pdf | 2019-09-27 |
| 32 | 7849-delnp-2014-GPA-(03-12-2014).pdf | 2014-12-03 |
| 33 | 7849-DELNP-2014-DRAWING [27-09-2019(online)].pdf | 2019-09-27 |
| 33 | 7849-DELNP-2014.pdf | 2014-10-03 |
| 34 | 7849-DELNP-2014-COMPLETE SPECIFICATION [27-09-2019(online)].pdf | 2019-09-27 |
| 34 | Abstract.pdf | 2014-09-26 |
| 35 | 7849-DELNP-2014-CLAIMS [27-09-2019(online)].pdf | 2019-09-27 |
| 35 | Complete Specification as published.pdf | 2014-09-26 |
| 36 | 7849-DELNP-2014-ABSTRACT [27-09-2019(online)].pdf | 2019-09-27 |
| 36 | Drawings.pdf | 2014-09-26 |
| 37 | FORM 3.pdf | 2014-09-26 |
| 37 | 7849-DELNP-2014-OTHERS [03-10-2019(online)].pdf | 2019-10-03 |
| 38 | FORM 5.pdf | 2014-09-26 |
| 38 | 7849-DELNP-2014-FER_SER_REPLY [03-10-2019(online)].pdf | 2019-10-03 |
| 39 | 7849-DELNP-2014-PatentCertificate25-06-2021.pdf | 2021-06-25 |
| 39 | 7849-delnp-2014-Assignment-(25-09-2014).pdf | 2014-09-25 |
| 40 | 7849-DELNP-2014-IntimationOfGrant25-06-2021.pdf | 2021-06-25 |
| 40 | 7849-delnp-2014-Correspondence-Others-(25-09-2014).pdf | 2014-09-25 |
| 1 | 7849DELNP2014_04-10-2018.pdf |