Secure mobile device and allocation system
First Claim
1. A method of securely allocating mobile devices to at least one user, comprising the steps of:
- storing a plurality of mobile devices in an inoperative state under the control of a host computer;
accepting as an input an identification code; and
the host computer selectively placing a mobile device among the plurality of mobile devices in an operative state based on the identification code.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of securely allocating mobile devices is disclosed. A plurality of mobile devices are stored in an inoperative state under the control of a host computer. A user enters an identification code, which is received by the host computer, and the host computer selectively places a mobile device in an operative state based on the identification code. If the selected mobile device is not returned within a first predetermined interval, then the selected mobile device is placed back in the inoperative state. If the selected mobile device is not returned within a second predetermined interval, then all data within the selected mobile device'"'"'s memory is purged. Additionally, the plurality of mobile devices can be stored in a secure area. Access to the secure area is granted based on the identification code.
76 Citations
62 Claims
-
1. A method of securely allocating mobile devices to at least one user, comprising the steps of:
-
storing a plurality of mobile devices in an inoperative state under the control of a host computer;
accepting as an input an identification code; and
the host computer selectively placing a mobile device among the plurality of mobile devices in an operative state based on the identification code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of securely allocating mobile devices to at least one user, comprising the steps of:
-
storing a plurality of mobile devices in a secure area, access to the secure area being under the control of a host computer;
accepting as an input an identification code; and
the host computer granting the user access to the secure area based on the identification code. - View Dependent Claims (26, 27, 28)
-
-
29. A mobile device allocation system for securely allocating mobile devices to a plurality of users, comprising:
-
at least one system backbone;
at least one host computer coupled to the system backbone; and
a plurality of mobile terminals operatively configured to communicate to the host computer through the system backbone, wherein the plurality of mobile devices are stored in an inoperative state, and the at least one host computer and a selected mobile device are operatively configured to place the selected mobile device in an operative state based upon an identification code. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. A mobile device allocation system, comprising:
-
at least one secure area;
at least one system backbone;
at least one host computer coupled to the system backbone; and
a plurality of mobile devices operatively configured to communicate to the host computer through the system backbone, wherein the plurality of mobile devices are stored in the at least one secure area, and the at least one host computer is operatively configured to grant access to the at least one secure area based on a valid identification code. - View Dependent Claims (60, 61, 62)
-
Specification