Control of security or ease-of-use sensitivity for a wireless communication device
First Claim
Patent Images
1. A method for automatically managing wireless communication device access based on preference settings controlled by an authorized party, the method comprising:
- remotely receiving preference settings associated with accessibility of the wireless communication device;
updating preference configuration data in the wireless communication device to reflect the preference settings;
monitoring a state of the wireless communication device and determining a change in state;
providing a user interface at the wireless communication device based on the preference settings and the monitored change in state, the user interface being configured to request information from any potential user of the wireless communication device; and
controlling access to the use of the wireless communication device or a feature available at the wireless communication device based on information provided by the potential user, wherein the information comprises user security information.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling the security or accessibility of a wireless communication device is disclosed herein. Security preference settings are configured for the wireless communication device. Depending on the security preference settings, the user interface(s) of the wireless communication device may be appropriately changed to provide the set level of device security or accessibility.
-
Citations
36 Claims
-
1. A method for automatically managing wireless communication device access based on preference settings controlled by an authorized party, the method comprising:
-
remotely receiving preference settings associated with accessibility of the wireless communication device;
updating preference configuration data in the wireless communication device to reflect the preference settings;
monitoring a state of the wireless communication device and determining a change in state;
providing a user interface at the wireless communication device based on the preference settings and the monitored change in state, the user interface being configured to request information from any potential user of the wireless communication device; and
controlling access to the use of the wireless communication device or a feature available at the wireless communication device based on information provided by the potential user, wherein the information comprises user security information. - View Dependent Claims (2, 3)
-
-
4. A method for automatically managing wireless device access, the method comprising:
-
providing an interface at the wireless device based on one of at least three security preferences set for the wireless device, the interface being provided before a limited access feature on the wireless device becomes accessible to a potential user, and wherein the interface requests security information; and
preventing use of the limited access feature when provided security information is incorrect, wherein the limited access feature comprises at least one feature available at the wireless device. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 13)
-
-
12. The method of 4, further comprising receiving user input identifying one of two users, and setting the security preference for the one potential user, wherein a different security preference is associated with the other of the two users.
-
14. An apparatus for controlling access to a wireless device, the apparatus comprising:
-
means for setting an accessibility preference;
means for providing the accessibility preference to the wireless device;
means for configuring the accessibility preference at the wireless device;
means for requesting accessibility information from a potential user of the wireless device before a limited access feature becomes accessible to the potential user, the means for requesting configured based on the accessibility preference; and
means for controlling access to the limited access feature in response to the accessibility information received. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer-readable medium having instructions stored thereon, the instructions executable by a processor to cause the processor to:
-
notice a selected state of a wireless device; and
in response to the selected state, invoke at least one application that requests information from a potential user of the wireless device, access preset data regarding at least one approved user, and provide access to the wireless device when the potential user is an approved user based on a match between the received information from the potential user and the preset data, wherein the at least one application is invoked a certain number of times and requests different information in accordance with a security level set from among at least three security levels. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A wireless mobile device, comprising:
-
a security interface that changes based on a preset security level; and
a memory configured to store a list of relationships between states and actions to be taken by the device, wherein the device is configured to monitor the occurrence of the states and invoke at least the security interface according to the list of relationships, the list of relationships being configured based on the preset security level. - View Dependent Claims (30, 31, 32, 33)
-
-
34. A computer-readable medium storing a display description for setting an accessibility level of a wireless communication device, comprising:
-
a first portion identifying at least three levels of accessibility;
a second portion selectable by a user to specify one of the at least three levels of accessibility; and
an optional third portion providing a description of the at least three levels of accessibility. - View Dependent Claims (35, 36)
-
Specification