Content protection on an electronic device
First Claim
1. A method for securing access to content, comprising:
- associating a first account with a first security level, the first security level associated with public access to content on an electronic device, the first account associated with a first application on the electronic device;
associating a second account with a second security level, the second security level associated with first secured access to content on the electronic device, the second security level associated with first authentication information, the second account associated with the first application;
associating a second application on the electronic device with the second security level, the second application different from the first application;
receiving a first selection of a first content item, the first content item associated with the first account;
providing access to the first content item;
receiving a second selection of a second content item, the second content item associated with the second account;
receiving, at a first time, the first authentication information associated with the second security level;
providing access to the second content item based on successful authentication of the first authentication information received at the first time;
receiving a third selection of a third content item, the third content item associated with the second application; and
providing access to the third content item based on the successful authentication of the first authentication information received at the first time.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments enable a user of an electronic device to selectively secure applications and/or content of the electronic device. For instance, certain embodiments enable a user to password protect applications (e.g., email, calendar, contacts, photos) within a single environment. In some embodiments, a user can selectively secure specific content (e.g., work-related email messages, personal emails, work-related calendar entries, corporate contacts) within an application. Further, some embodiments enable a user to specify which applications and/or types of content the user would like to password protect. For instance, a user that has sensitive work-related information stored on or accessible through the user'"'"'s device may choose to password protect work-related applications (e.g., work email account) and content (e.g., work documents, work-related calendar entries). By allowing the user to selectively secure certain applications and/or content on the electronic device, the user'"'"'s interaction with the device is improved and made more convenient.
27 Citations
16 Claims
-
1. A method for securing access to content, comprising:
-
associating a first account with a first security level, the first security level associated with public access to content on an electronic device, the first account associated with a first application on the electronic device; associating a second account with a second security level, the second security level associated with first secured access to content on the electronic device, the second security level associated with first authentication information, the second account associated with the first application; associating a second application on the electronic device with the second security level, the second application different from the first application; receiving a first selection of a first content item, the first content item associated with the first account; providing access to the first content item; receiving a second selection of a second content item, the second content item associated with the second account; receiving, at a first time, the first authentication information associated with the second security level; providing access to the second content item based on successful authentication of the first authentication information received at the first time; receiving a third selection of a third content item, the third content item associated with the second application; and providing access to the third content item based on the successful authentication of the first authentication information received at the first time. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for securing access to content, comprising:
-
associating a first account with a first security level, the first security level associated with public access to content on an electronic device, the first account associated with a first application on the electronic device; associating a second account with a second security level, the second security level associated with first secured access to content on the electronic device, the second security level associated with first authentication information, the second account associated with the first application; associating a second application on the electronic device with the second security level, the second application different from the first application; associating a third account with a third security level, the third security level associated with second secured access to content on the electronic device, the third security level associated with second authentication information, the second authentication information different from the first authentication information, the third account associated with the first application; receiving a first selection of a first content item, the first content item associated with the first account; providing access to the first content item within the first application; receiving a second selection of a second content item, the second content item associated with the second application on the electronic device; receiving, at a first time, the first authentication information for access to content associated with the second security level; providing access to the second content item within the second application; receiving a third selection of a third content item, the third content item associated with the second account; providing access to the third content item within the first application; receiving a fourth selection of a fourth content item, the fourth content item associated with the third account; receiving, at a second time, the second authentication information for access to content associated with the third security level; and providing access to the fourth content item based on the successful authentication of the second authentication information received at the second time. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A portable computing device, comprising:
-
a processor; a memory device including instructions that, when executed by the processor, cause the portable computing device to; associate a first account with a first security level, the first security level associated with public access to content on the portable computing device, the first account associated with a first application on the portable computing device; associate a second account with a second security level, the second security level associated with first secured access to content on the portable computing device, the second security level associated with first authentication information, the second account associated with the first application; associate a second application on the portable computing device with the second security level, the second application different from the first application; receive a first selection of a first content item, the first content item associated with the first account; provide access to the first content item; receive a second selection of a second content item, the second content item associated with the second account; receive, at a first time, the first authentication information associated with the second security level; provide access to the second content item based on successful authentication of the first authentication information received at the first time; receive a third selection of a third content item, the third content item associated with the second application; and provide access to the third content item based on the successful authentication of the first authentication information received at the first time. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification