SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO A COMPUTING DEVICE
First Claim
1. A method of controlling access to a computing device, wherein in operation, m access rights associated with the computing device are provided only upon successful verification of n authentication factors, where m and n are integers greater than 1, the method comprising:
- receiving one or more authentication factors required for access to the computing device;
verifying each of the one or more authentication factors received;
if at least one authentication factor is successfully verified and the number of successfully verified authentication factors equals n, providing m access rights; and
if at least one authentication factor is successfully verified and the number of successfully verified authentication factors is less than n,determining a selected subset of access rights from a plurality of different subsets of access rights, wherein the plurality of different subsets of access rights comprises more than one subset consisting of less than m access rights, andproviding the selected subset of access rights.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling user access to a computing device (e.g. a mobile device). In some embodiments, access rights are provided to a user based on successfully verified authentication factors, even where the user is unable to provide all the authentication factors typically required for access to the computing device. In one broad aspect, one or more authentication factors are provided by a user, and are received and verified by a security module application residing and executing on the computing device. When less than all of the authentication factors that would typically be expected in authenticating a user for access to the computing device is received and successfully verified, a subset of the available access rights selected from a plurality of different pre-defined subsets of access rights is provided to the user. The specific access rights provided to the user are based on the successfully verified authentication factors.
97 Citations
22 Claims
-
1. A method of controlling access to a computing device, wherein in operation, m access rights associated with the computing device are provided only upon successful verification of n authentication factors, where m and n are integers greater than 1, the method comprising:
-
receiving one or more authentication factors required for access to the computing device; verifying each of the one or more authentication factors received; if at least one authentication factor is successfully verified and the number of successfully verified authentication factors equals n, providing m access rights; and if at least one authentication factor is successfully verified and the number of successfully verified authentication factors is less than n, determining a selected subset of access rights from a plurality of different subsets of access rights, wherein the plurality of different subsets of access rights comprises more than one subset consisting of less than m access rights, and providing the selected subset of access rights. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable medium comprising instructions executable on a processor of a computing device for implementing a method of controlling access to the computing device, wherein in operation, m access rights associated with the computing device are provided only upon successful verification of n authentication factors, where m and n are integers greater than 1, the method comprising:
-
receiving one or more authentication factors required for access to the computing device; verifying each of the one or more authentication factors received; if at least one authentication factor is successfully verified and the number of successfully verified authentication factors equals n, providing m access rights; and if at least one authentication factor is successfully verified and the number of successfully verified authentication factors is less than n, determining a selected subset of access rights from a plurality of different subsets of access rights, wherein the plurality of different subsets of access rights comprises more than one subset consisting of less than m access rights, and providing the selected subset of access rights.
-
-
20. A system for controlling access to a computing device, the system comprising at least a processor and a memory, wherein in operation, m access rights associated with the computing device are provided only upon successful verification of n authentication factors, where m and n are integers greater than 1, wherein the system is configured to execute a security module programmed to perform acts comprising:
-
receiving one or more authentication factors required for access to the computing device; verifying each of the one or more authentication factors received; if at least one authentication factor is successfully verified and the number of successfully verified authentication factors equals n, providing m access rights; and if at least one authentication factor is successfully verified and the number of successfully verified authentication factors is less than n, determining a selected subset of access rights from a plurality of different subsets of access rights, wherein the plurality of different subsets of access rights comprises more than one subset consisting of less than m access rights, and providing the selected subset consisting of less than m access rights. - View Dependent Claims (21)
-
-
22. An access-controlled mobile device, wherein in operation, m access rights associated with the mobile device are provided only upon successful verification of n authentication factors, where m and n are integers greater than 1, wherein the mobile device comprises at least a processor and a memory, and wherein the mobile device further comprises a security module executable by the processor, the security module programmed to perform acts comprising:
-
receiving one or more authentication factors required for access to the mobile device; verifying each of the one or more authentication factors received; if at least one authentication factor is successfully verified and the number of successfully verified authentication factors equals n, providing m access rights; and if at least one authentication factor is successfully verified and the number of successfully verified authentication factors is less than n, determining a selected subset of access rights from a plurality of different subsets of access rights, wherein the plurality of different subsets of access rights comprises more than one subset consisting of less than m access rights, and providing the selected subset consisting of less than m access rights.
-
Specification