System and method for protecting data provided by a cellular telephone
First Claim
Patent Images
1. A method for authenticating a user to a cellular telephone, the method comprising:
- providing a cellular telephone;
providing a matrix having a plurality of authentication parameters in one dimension and a plurality of applications provided by the cellular telephone in another dimension;
associating each of the plurality of applications provided by the cellular telephone with one or more of the plurality of authentication parameters of the matrix; and
satisfying one or more of the associated authentication parameters to provide access to one or more of the associated applications to a user of the cellular telephone.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating a user to a cellular telephone includes providing a cellular telephone, providing a matrix having a plurality of authentication parameters in one dimension and a plurality of applications provided by the cellular telephone in another dimension, associating each of the plurality of applications provided by the cellular telephone with one or more of the plurality of authentication parameters of the matrix and satisfying one or more authentication parameters to provide access to one or more applications to a user of the cellular telephone.
46 Citations
20 Claims
-
1. A method for authenticating a user to a cellular telephone, the method comprising:
-
providing a cellular telephone;
providing a matrix having a plurality of authentication parameters in one dimension and a plurality of applications provided by the cellular telephone in another dimension;
associating each of the plurality of applications provided by the cellular telephone with one or more of the plurality of authentication parameters of the matrix; and
satisfying one or more of the associated authentication parameters to provide access to one or more of the associated applications to a user of the cellular telephone. - View Dependent Claims (2, 3, 4)
-
-
5. A system comprising:
-
a cellular telephone for providing a plurality of applications; and
an agent for providing first and second authentication parameters for authenticating a user of the cellular telephone to a first one of the applications and a second one of the applications running on the cellular telephone;
wherein the first one of the applications is enabled by authenticating the user through the first authentication parameter;
wherein the second one of the applications is enabled by authenticating the user through the second authentication parameter;
wherein the agent authenticates the user to the first application following the first authentication parameter; and
wherein the agent authenticates the user to the second application following the second authentication parameter. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for authenticating a user to a cellular telephone comprising:
-
providing one or more applications; and
assigning a plurality of authentication parameters to the one or more applications to authenticate a user of the cellular telephone to the one or more applications;
wherein each authentication parameter has a criterion for satisfaction; and
wherein the criterion for satisfaction of a first one of the authentication parameters changes in response to satisfaction of the criterion of a second one of the authentication parameters. - View Dependent Claims (19, 20)
-
Specification