Electronic devices having adaptive security profiles and methods for selecting the same
First Claim
Patent Images
1. A method comprising:
- by an electronic device with one or more processors and memory;
detecting a request to initiate a respective security profile on the electronic device;
in response to detecting the request to initiate the respective security profile on the electronic device, enforcing the respective security profile on the electronic device;
while the respective security profile is enforced on the electronic device, detecting a request to access a first function or feature of the electronic device; and
in response to detecting the request to access the first function or feature of the electronic device;
in accordance with a determination that the respective security profile is a first security profile, controlling access to the first function or feature using a first set of restrictions that defines access control for a plurality of functions or features of the electronic device, including the first function or feature; and
in accordance with a determination that the respective security profile is a second security profile, controlling access to the first function or feature using a second set of restrictions, different than the first set of restrictions, that defines access control for the plurality of functions or features of the electronic device, including the first function or feature;
wherein the first set of restrictions requires authentication to access the first function or feature, and the second set of restrictions does not require authentication to access the first function or feature.
0 Assignments
0 Petitions
Accused Products
Abstract
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based on the device'"'"'s location and one or more geographic zone definitions. The security profiles may be used to determine the level of authentication or number of invalid authentication attempts for a particular feature or application or set of features or applications.
35 Citations
24 Claims
-
1. A method comprising:
-
by an electronic device with one or more processors and memory; detecting a request to initiate a respective security profile on the electronic device; in response to detecting the request to initiate the respective security profile on the electronic device, enforcing the respective security profile on the electronic device; while the respective security profile is enforced on the electronic device, detecting a request to access a first function or feature of the electronic device; and in response to detecting the request to access the first function or feature of the electronic device; in accordance with a determination that the respective security profile is a first security profile, controlling access to the first function or feature using a first set of restrictions that defines access control for a plurality of functions or features of the electronic device, including the first function or feature; and in accordance with a determination that the respective security profile is a second security profile, controlling access to the first function or feature using a second set of restrictions, different than the first set of restrictions, that defines access control for the plurality of functions or features of the electronic device, including the first function or feature; wherein the first set of restrictions requires authentication to access the first function or feature, and the second set of restrictions does not require authentication to access the first function or feature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An electronic device comprising:
-
one or more processors; and memory storing instructions, which when executed by the one or more processors, cause the electronic device to; detect a request to initiate a respective security profile on the electronic device; in response to detecting the request to initiate the respective security profile on the electronic device, enforce the respective security profile on the electronic device; while the respective security profile is enforced on the electronic device, detect a request to access a first function or feature of the electronic device; and in response to detecting the request to access the first function or feature of the electronic device; in accordance with a determination that the respective security profile is a first security profile, control access to the first function or feature using a first set of restrictions that defines access control for a plurality of functions or features of the electronic device, including the first function or feature; and in accordance with a determination that the respective security profile is a second security profile, control access to the first function or feature using a second set of restrictions, different than the first set of restrictions, that defines access control for the plurality of functions or features of the electronic device, including the first function or feature, wherein the first set of restrictions requires authentication to access the first function or feature, and the second set of restrictions does not require authentication to access the first function or feature. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium storing instructions, which when executed by a processor of an electronic device, cause the electronic device to:
-
detecting a request to initiate a respective security profile on the electronic device; in response to detecting the request to initiate the respective security profile on the electronic device, enforce the respective security profile on the electronic device; while the respective security profile is enforced on the electronic device, detect a request to access a first function or feature of the electronic device; and in response to detecting the request to access the first function or feature of the electronic device; in accordance with a determination that the respective security profile is a first security profile, controlling access to the first function or feature using a first set of restrictions that defines access control for a plurality of functions or features of the electronic device, including the first function or feature; and in accordance with a determination that the respective security profile is a second security profile, controlling access to the first function or feature using a second set of restrictions, different than the first set of restrictions, that defines access control for the plurality of functions or features of the electronic device, including the first function or feature, wherein the first set of restrictions requires authentication to access the first function or feature, and the second set of restrictions does not require authentication to access the first function or feature. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification