Method and apparatus for differentiated access control
First Claim
Patent Images
1. A method for providing differentiated access control on a computing device having a connection with a second device, the method comprising:
- receiving, at the computing device, an input to start an application belonging to a first of a plurality of application subsets, the starting the application comprising executing the application on the computing device;
receiving, at the computing device, a user input to unlock the second device;
verifying the user input with the second device to unlock the first of the plurality of application subsets;
checking whether a timer has expired on the second device or—
whether a connection is lost to the second device, and based on expiration of the timer or loss of the connection to the second device, locking the first of the plurality of applications subsets on the computing device, the locking including;
allowing access to applications within at least a second of the plurality of application subsets, including allowing launching and enabling of at least one application within the at least the second of the plurality of application subsets;
preventing each application of the first of the plurality of application subsets from being launched on the computing device while the first of the plurality of applications subsets is locked; and
disabling a graphical user interface associated with each application of the first of the plurality of application subsetswherein the timer is associated with a countdown timer managed by the second device for decreasing time.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device.
132 Citations
24 Claims
-
1. A method for providing differentiated access control on a computing device having a connection with a second device, the method comprising:
-
receiving, at the computing device, an input to start an application belonging to a first of a plurality of application subsets, the starting the application comprising executing the application on the computing device; receiving, at the computing device, a user input to unlock the second device; verifying the user input with the second device to unlock the first of the plurality of application subsets; checking whether a timer has expired on the second device or—
whether a connection is lost to the second device, and based on expiration of the timer or loss of the connection to the second device, locking the first of the plurality of applications subsets on the computing device, the locking including;allowing access to applications within at least a second of the plurality of application subsets, including allowing launching and enabling of at least one application within the at least the second of the plurality of application subsets; preventing each application of the first of the plurality of application subsets from being launched on the computing device while the first of the plurality of applications subsets is locked; and disabling a graphical user interface associated with each application of the first of the plurality of application subsets wherein the timer is associated with a countdown timer managed by the second device for decreasing time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device comprising:
-
a processor; a communications subsystem; a user interface; and memory, wherein the computing device communicates with a second device, and wherein the computing device is configured to; receive an input to start an application belonging to a first of a plurality of application subsets, the starting the application comprising executing the application on the computing device; receive a user input to unlock the second device; verify the user input with the second device to unlock the first of the plurality of application subsets; determine whether a timer has expired on the second device or whether a connection is lost to the second device, and based on expiration of the timer or loss of the connection to the second device, lock the first of the plurality of applications subsets on the computing device, the locking including; allowing access to applications within at least a second of the plurality of application subsets, including allowing launching and enabling of at least one application within the at least the second of the plurality of application subsets; preventing each application of the first of the plurality of application subsets from being launched on the computing device while the first of the plurality of applications subsets is locked; and disabling a graphical user interface associated with each application of the first of the plurality of application subsets wherein the timer is associated with a countdown timer managed by the second device, for decreasing time. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium for storing instruction code, which, when executed by a processor of a computing device are configured to provide differentiated access control on the computing device having a connection with a second device, the instruction code comprising instructions for:
-
receiving an input to start an application belonging to a first of a plurality of application subsets, the starting the application comprising executing the application on the computing device; receiving a user input to unlock the second device; verifying the user input with the second device to unlock the first of the plurality of application subsets; checking whether a timer has expired on the second device or whether a connection is lost to the second device, and based on expiration of the timer or loss of the connection to the second device, locking the first of the plurality of applications subsets on the computing device, the locking including; allowing access to applications within at least a second of the plurality of application subsets, including allowing launching and enabling of at least one application within the at least the second of the plurality of application subsets; preventing each application of the first of the plurality of application subsets from being launched on the computing device while the first of the plurality of applications subsets is locked; and disabling a graphical user interface associated with each application of the first of the plurality of application subsets wherein the timer is associated with a countdown timer managed by the second device, for decreasing time. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification