Varying the amount of time that a mobile device must be inactive before the mobile device re-locks access to a computerized resource
First Claim
1. A method of controlling access to a computerized resource of a mobile device, the method comprising:
- sensing, by processing circuitry, a set of environmental factors from a particular environment of the mobile device when the mobile device unlocks the computerized resource in response to successful authentication of a user, wherein sensing the set of environmental factors includes detecting, via a microphone of the mobile device, whether the mobile device is in a vicinity of a familiar audio source;
selecting, by the processing circuitry, an expiration time based on the set of environmental factors, at least in part by choosing a relatively longer particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is a trusted environment and choosing a relatively shorter particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is not a trusted environment, and wherein the set of environmental factors indicate that the particular environment is a trusted environment when the mobile device is in a vicinity of the familiar audio source; and
configuring, by the processing circuitry, an inactivity timer to re-lock access to the computerized resource of the mobile device when the inactivity timer identifies a time period of mobile device inactivity that reaches the selected expiration time.
9 Assignments
0 Petitions
Accused Products
Abstract
A technique controls access to a computerized resource of a mobile device (e.g., a smart phone, a tablet, a laptop computer, etc.). The technique involves sensing, by processing circuitry, a set of environmental factors from a particular environment of the mobile device when the mobile device unlocks the computerized resource in response to successful authentication of a user. The technique further involves selecting, by the processing circuitry, an expiration time based on the set of environmental factors. The technique further involves configuring, by the processing circuitry, an inactivity timer to re-lock access to the computerized resource of the mobile device when the inactivity timer identifies a time period of mobile device inactivity that reaches the selected expiration time. Along these lines, this time period may be relatively long in a trusted environment (e.g., an hour, several hours, etc.), but relatively short in an untrusted environment (e.g., a few minutes).
-
Citations
20 Claims
-
1. A method of controlling access to a computerized resource of a mobile device, the method comprising:
-
sensing, by processing circuitry, a set of environmental factors from a particular environment of the mobile device when the mobile device unlocks the computerized resource in response to successful authentication of a user, wherein sensing the set of environmental factors includes detecting, via a microphone of the mobile device, whether the mobile device is in a vicinity of a familiar audio source; selecting, by the processing circuitry, an expiration time based on the set of environmental factors, at least in part by choosing a relatively longer particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is a trusted environment and choosing a relatively shorter particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is not a trusted environment, and wherein the set of environmental factors indicate that the particular environment is a trusted environment when the mobile device is in a vicinity of the familiar audio source; and configuring, by the processing circuitry, an inactivity timer to re-lock access to the computerized resource of the mobile device when the inactivity timer identifies a time period of mobile device inactivity that reaches the selected expiration time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An electronic apparatus, comprising:
-
memory; and control circuitry coupled to the memory, the memory storing instructions which, when carried out by the control circuitry, cause the control circuitry to; sense a set of environmental factors from a particular environment of a mobile device when the mobile device unlocks a computerized resource in response to successful authentication of a user, at least in part by detecting, via a microphone of the mobile device, whether the mobile device is in a vicinity of a familiar audio source; select an expiration time based on the set of environmental factors, at least in part by choosing a relatively longer particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is a trusted environment and choosing a relatively shorter particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is not a trusted environment, and wherein the set of environmental factors indicate that the particular environment is a trusted environment when the mobile device is in a vicinity of the familiar audio source; and configure an inactivity timer to re-lock access to the computerized resource of the mobile device when the inactivity timer identifies a time period of mobile device inactivity that reaches the selected expiration time.
-
-
20. A computer program product having a non-transitory computer readable medium which stores a set of instructions to control access to a computerized resource of a mobile device;
- the set of instructions, when carried out by computerized circuitry, causing the computerized circuitry to perform a method of;
sensing a set of environmental factors from a particular environment of a mobile device when the mobile device unlocks a computerized resource in response to successful authentication of a user, wherein sensing the set of environmental factors includes detecting, via a microphone of the mobile device, whether the mobile device is in a vicinity of a familiar audio source; selecting an expiration time based on the set of environmental factors, at least in part by choosing a relatively longer particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is a trusted environment and choosing a relatively shorter particular predefined time as the selected expiration time in response to the set of environmental factors indicating that the particular environment is not a trusted environment, and wherein the set of environmental factors indicate that the particular environment is a trusted environment when the mobile device is in a vicinity of the familiar audio source; and configuring an inactivity timer to re-lock access to the computerized resource of the mobile device when the inactivity timer identifies a time period of mobile device inactivity that reaches the selected expiration time.
- the set of instructions, when carried out by computerized circuitry, causing the computerized circuitry to perform a method of;
Specification