n the phone, so that certain context information would be changed to the mislead information when intrusions occur; enabling the security features to monitor if any intruders are approaching to the phone; when an intruder is found approaching to the phone, performing security measures, including protecting confidential information from the intruder, wherein the confidential information includes