Apple Patent Foretells iPod And iPhone Security - InformationWeek
IoT
IoT
Business & Finance
News
6/21/2007
07:57 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
IP Intelligence: The Utility Player for Your Online Business
Aug 31, 2017
Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve you ...Read More>>

Apple Patent Foretells iPod And iPhone Security

The patent application envisions several possible tests that could be used to prevent a portable device from being recharged.

iPhone thieves may find that crime does not pay. A patent application published Thursday by the U.S. Patent & Trademark Office suggests that Apple has been developing security features for the iPod and the iPhone.

The patent application, Protecting electronic devices from extended unauthorized use, describes a way to prevent mobile devices from being charged following the failure of an authorization check.

"Unfortunately, theft of more popular electronic devices such as the Apple iPod music-player has become a serious problem," the patent application states. "In a few reported cases, owners of the Apple iPod themselves have been seriously injured or even murdered. Hence, techniques that can protect against unauthorized use and deter and reduce theft of such devices would be highly useful."

Apple's technique is to fight the power. The patent application envisions several possible tests that could be used to prevent a portable device from being recharged: "a timer expires, device is connected to a power-supply or another device, device is outside a determined geographical boundary."

When those conditions are met, Apple's software would ask the device user for an authorization code. Failure to enter the correct code would prevent the device from bring recharged. And as the patent application rather dryly puts it, "normal use and enjoyment of the device can be significantly reduced by disabling the recharger."

This approach may not protect confidential data, but it could reduce the incentive to mug the slew of gleeful iPhone owners who are sure to appear in coming weeks.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll