END USER PRIVACY PROTECTION SYSTEM AND METHOD THEREOF
20220391535 ยท 2022-12-08
Inventors
Cpc classification
H04W12/02
ELECTRICITY
International classification
Abstract
An end user privacy Protection system and method thereof is disclosed. Said system comprises of an Hardware Processing Unit (HPU) featuring a means to set the time duration to allow the application access to mobile phone hardware components, a comparator unit to read the remaining permitted time on a counter at any given time, wherein said comparator unit activates a driver unit to activate a set of electric/electronic switches or relays to disconnect said mobile phone hardware components when the permitted time duration set by the user expires. The system also features a means to bypass the access restriction at any moment. This security method is implementable to the all the computers, laptops, smart devices and wearable devices other than mobile phone irrespective of its operating system.
Claims
1. An end user privacy protection system that enables users to restrict application' access to mobile hardware components such as camera, microphone, and storage as well as location services, except for user decided duration, said system comprising of: a hardware interface adapted to receive control connections from said mobile hardware components; time setter unit configured to set time from zero to 10 minutes, wherein a counter is incremented on each incremental pulse generated by pressing an enabler switch (S1) by the user; run down counter configured to be loaded from said counter, wherein said run down counter is activated by the enabler switch (S1) press; comparator unit configured to disable application's access to the camera, mic, GPS, storage as well as location services once the countdown on the run down counter reads 00.00 minutes; electric/electronic switches or relays configured to connect and disconnect access to the respective mobile phone hardware components; and driver circuit configured to operate said electric/electronic switches or relays, wherein said driver circuit is driven by the output of the comparator unit.
2. The end user privacy protection system as claimed in claim 1, wherein the comparator circuit is configured to activate or deactivate the run down counter.
3. The end user privacy protection system as claimed in claim 1, wherein the run down counter is configured to be reset to a new time on pressing enabler switch S1 even if a present countdown is in progress.
4. The end user privacy protection system as claimed in claim 1, wherein the driver circuit features a permanent off switch (S3) to facilitate application's permanent access to the mobile phone hardware.
5. The end user privacy protection system as claimed in claim 1, wherein the enabler switch (S1) output is fed to a de-bouncer circuit.
6. The end user privacy protection system as claimed in claim 1, wherein the comparator unit features a disabler switch (S2) configured to physically disconnect access to the mic, camera, GPS and file access (storage) at any time by user's interest.
7. A method to regulate application access to mobile phone hardware components such as camera, microphone, and storage, as well as location services for user selected duration, said method comprising of: setting the time on the timer by pressing the enabler switch (Si), during when the application' access to said hardware components is allowed, wherein the associated counter is incremented on each incremental pulse generated by respective switch presses; loading said time dynamically on the run down counter; checking the down counter by the comparator unit, wherein it maintains a first digital logic state when the counter is set to a value and when it is down counting; activating the electric/electronic switches/relays to connect the mobile phone hardware controls by the driver circuit based on said first digital logic state; generating a second digital logic state by the comparator unit when the countdown reaches a pre-determined number; and deactivating the electric/electronic switches or relays to disconnect the respective mobile phone hardware components by the driver circuit.
8. The method as claimed in claim 7, wherein the electric/electronic switches or relays disconnect the respective mobile phone hardware components based on the second digital logic state.
9. The method as claimed in claim 7, wherein the access to the files and folders having their file path saved in a configuration file is restricted.
10. The method as claimed in claim 7, wherein the access restriction method works irrespective of type of operating system in the mobile phone, computer, laptop, wearable devices and similar smart devices.
11. The method as claimed in claim 7, wherein the pre-determined number is 00:00.
Description
BRIEF DESCRIPTION OF ACCOMPANYING FIGURES
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
DETAILED DESCRIPTION OF INVENTION
[0048] The preferred embodiments of the present invention will now be explained with reference to the accompanying drawings. It should be understood however that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. The following description and drawings are not to be construed as limiting the invention and numerous specific details are described to provide a thorough understanding of the present invention, as the basis for the claims and as a basis for teaching one skilled in the art on how to make and/or use the invention. However in certain instances, well-known or conventional details are not described in order not to unnecessarily obscure the present invention in detail.
[0049] The preferred embodiment of the present invention details an end user privacy protection system and method thereof that enables the user to restrict app/software access to mobile phone hardware such as camera, microphone, and storage, as well as location services such as GPS/GLONASS or similar services by default. If the user needs the applications or software to use any of these hardware components/services, the user needs to interact with the system and choose an approximate required time of connection, whereupon the device's hardware/services will be accessible to the application' based on the privileges granted to that application (app) at the time of its installation.
[0050] Referring to
[0051] Consequently, whenever an app needs to use any of these components, the user has to trigger the HPU device and select the approximate required time of connection. Based on said time frame, and privileges granted to the app at the time of installation, these hardware components/services will be accessible for the apps for the set duration. The remaining time available is also simultaneously shown in the display unit. In addition, a distinct buzzer notification is provided at 19 seconds and 09 seconds respectively before the permitted time expires.
[0052] Therefore, the user could extend the once set time duration based on his requirements while using the concerned app.
[0053] Referring to
[0054] The Hardware Processing Unit (HPU) of the end user privacy protection system features two micro-switches, wherein one switch is an enabler switch S1 configured to enable the hardware components as well as set the enabled duration. More specifically, in the first press, said switch enables the connectivity of the selected app to the hardware devices and location service, wherein subsequent switch presses is configured to increase the permitted duration of time from zero to 10 minutes cyclically. Further extension to several minutes and hours is possible, if required. The second micro-switch S2 is a disabler switch configured to disconnect the hardware components at any point in time. Once said disabler switch is pressed, the access to mic, camera, and GPS is stopped and file access to storage space is blocked. On pressing said switch, the mic, camera & GPS will be permanently disconnected from its usage.
[0055] In order to pre-empt the possibility of multiple signals getting generated in a single switch press, a de-bouncer circuit is employed, as shown in
[0056] The IC 74193 with the load inputs are shown in
[0057] The preferred embodiment of the present invention uses a four digit counter. The circuit for generating the seconds' digits are depicted in
[0058] The left hand side 74193 IC is configured to run the display's MSB second digit. The clock pulse for this bit is given from the MSB BCD output of first unit (Q3 of LSB second). It is configured to run from 0 to 5 wherein its working is similar to the LSB of second as explained above except that the loading values is changed to 5 (0101 is the binary corresponding to 5). Half part of the NAND gate IC is used for the first digit and remaining half for the next digit.
[0059]
[0060] The enabler switch S1 has two functionalities. As mentioned, activating said switch allows app' access to the mobile phone hardware components, and the second functionality is to manually set the duration for which access is allowed by the system. That is, in the first press, it enables the access to the hardware components, wherein the subsequent switch presses cause to increment the allowed time duration from zero to 10 minutes cyclically.
[0061] The output of the 7414 de-bouncer output is fed to the 7490 counter, wherein upon each switch press, the counter is incremented by one (+1) wherein it is fed to the load pins of the 74193 counter. The pre-set pin of the 74193 counter is fed from the 7404 IC. That is, the load input pins are loaded during the switch press, wherein it is immediately preceded by loading the pre-set pin. As shown in the figure, the clock pulse for the 74193 IC is provided from the previous stage. So the counter will be running as usual. It is loaded from the enabler switch (between 0 and 10 minutes).
[0062] As depicted in
[0063] Specifically, as illustrated in
[0064] As per the preferred embodiment of the present invention, the user could start another session, when the counter is stopped and the display reads 00:00. To begin said session, the enabler switch is pressed to generate a pulse wherein it is fed to the 4072 OR gate IC through a 7414 de-bouncer IC and 7404 NOT gate IC (first NOT gate), as depicted in
[0065] The driver circuit is depicted in
[0066] In another embodiment of the present invention, the app's access to the hardware components such as camera, mic and storage as well as location services may be regulated independently as per user requirement. That is, the app's access to one or more of the hardware components may be individually selected and blocked without restricting access to the other components.
[0067] As shown in
[0068] The system also features a paced buzzer notification module to provide two distinct voice notifications to the user when the allotted time counts down to 00:19 second and 00:09 second respectively. For example, if the user is speaking over a call, he might not notice the time left on the counter or if it is about to expire, and as a result, his call might be disturbed by the mic disconnection. Therefore, to avoid such a situation, the buzzer is configured to provide beep alarms from 00:19 second with less noise (0.5 Hz) and with high pace noise (0.25 Hz) notification at 00:09 second onwards.
[0069] Circuits to eliminate harmonics, and a circuitry to reset the counter to start from zero every time is also included.
Testing
[0070] The Hardware Processing Unit (HPU) of the end user privacy protection system integrated to a mobile phone is shown in
[0071] The red section illustrates the duration wherein the mic is allowed for recording, wherein the up and down voice waveform indicates that the recording was in progress. When the allowed time count downs to zero or, by pressing the disabler switch, the permission to the mic is revoked wherein said mic is removed from the operation. The green section shows the sound profile when the mic is revoked. In said system, as the control wires are taken out wherein they are physically disconnected through a hardware switch, it is impossible to restore the mic connection through software means or program. The access to mic is controlled/restricted for, but not limited to, incoming calls, outgoing calls, voice recorder, and social media platforms.
[0072] Similarly, the camera access is controlled, as illustrated in
[0073] The HPU is also configured to connect and disconnect the GPS whenever the user allows or revokes the permission. The instances wherein the GPS was accessible, and when the access was restricted, are illustrated in
[0074] In order to demonstrate file access and copy with user permission and control, a privacy mobile app is used. The files or folders to be secured are stored in a configuration file. The privacy mobile app is configured to check whether the file path exists in the configuration file. If the file path or containing folder is present in the configuration file, the user permission is required to access and copy the corresponding file. The user permission is fed from the Hardware Processing Unit to the mobile app via the charging USB port of the mobile device. If the user does not give permission, then the file access and copy is not allowed. Once the user grants permission, the file access and copy is allowed to the app. If the file path is not available in the configuration file, then these restrictions does not exist and these files are freely accessed and copied as existing.
[0075] The present invention can be implemented not only to the mobile devices or computer, it can be extended to units such as tablets, smart devices, wearable devices wherever the microphone, camera, GPS or similar service, data storage operation is present.
[0076] As depicted in
[0077] Although the present invention has been described in connection with the preferred embodiments thereof with reference to the accompanying drawings, it is to be noted that various changes and modifications are possible and are apparent to those skilled in the art. Such changes and modifications are to be understood as included within the scope of the present invention unless they depart there from.